Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LocalPlayback.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Config.Msi\6c4c8e.rbs
|
data
|
dropped
|
||
C:\Config.Msi\6c4c92.rbs
|
data
|
dropped
|
||
C:\Config.Msi\6c4c96.rbs
|
data
|
dropped
|
||
C:\Config.Msi\6c4c9a.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0409.ini (copy)
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0804.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0814D.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0817D.tmp
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\ISS80A0.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\ISSetup.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\dat7B00.tmp
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\dat7B01.tmp
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\data1.cab (copy)
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\data1.hdr (copy)
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\lay7AEF.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\layout.bin (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set7FB5.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set81BD.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set8289.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.ilg (copy)
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.inx (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Ana83C2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\AnalyzeData.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Aud83F2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\AudioRender.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\D3D8452.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\D3D84EF.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\D3DCompiler_43.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\D3DX9_43.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Eag859C.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\EagleEyeRender.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCC8669.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCCore.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCN86B8.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCN86E8.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDK.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Ana9465.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\AnalyzeData.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Aud9485.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\AudioIntercom.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\DsS94A6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\DsSdk.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCA9581.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCA95A2.tmp
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCAlarm.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCAlarm.lib (copy)
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCC95A3.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCCoreDevCfg.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCD95D2.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCDisplay.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCG95F3.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCG9632.tmp
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCGeneralCfgMgr.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCGeneralCfgMgr.lib (copy)
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCI9643.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCIndustry.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCP9663.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCP9683.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCP96B3.tmp
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCPlayBack.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCPreview.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCPreview.lib (copy)
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCV96C4.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCVoiceTalk.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Ope9753.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\OpenAL32.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Str9774.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\StreamTransClient.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Sys9794.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\SystemTransform.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\lib96F4.tmp
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\libiconv2.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\msv9724.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\msvcr90.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HCNetUtils.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HDF8747.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HDFileSDK.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HWD8787.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\HWDecode.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Loc8846.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Loc8895.tmp
|
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (311), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Loc88B5.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\LocC2F3.tmp
|
PDF document, version 1.5, 13 pages (zip deflate encoded)
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Local Playback User Manual.pdf (copy)
|
PDF document, version 1.5, 13 pages (zip deflate encoded)
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\LocalPlayback.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\LocalPlayback.ism.771 (copy)
|
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (311), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\LocalXml.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\MP_8904.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\MP_8925.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\MP_Render.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\MP_VIE.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Netural\Cn\,0.>(7.(K..pdf (copy)
|
PDF document, version 1.5, 17 pages
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Netural\Cn\???A80F.tmp
|
PDF document, version 1.5, 17 pages
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Netural\En\LocA83F.tmp
|
PDF document, version 1.5, 13 pages
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Netural\En\Local Playback User Manual.pdf (copy)
|
PDF document, version 1.5, 13 pages
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Ope89B2.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\OpenAL32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Pla89D3.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\PlayCtrl.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt58AAE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt58B6B.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt58C27.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt58C67.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt58C87.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt58D82.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt5Core.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt5Gui.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt5Network.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt5PrintSupport.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt5Widgets.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Qt5Xml.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Set8DB2.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Set8DB3.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\SetC2E3.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Settings.xml (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Setup.xml (copy)
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Standard\Cn\,0.>(7.(K..pdf (copy)
|
PDF document, version 1.5, 16 pages
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Standard\Cn\???A900.tmp
|
PDF document, version 1.5, 16 pages
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Standard\En\LocA92F.tmp
|
PDF document, version 1.5, 13 pages (zip deflate encoded)
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Standard\En\Local Playback User Manual.pdf (copy)
|
PDF document, version 1.5, 13 pages (zip deflate encoded)
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Sup8DC4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\SuperRender.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Too8DD4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Too8EB0.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Too8F2E.tmp
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\ToolGuiToolkit.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\ToolShareModule.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\ToolShareModule.lib (copy)
|
current ar archive
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Upg8FDB.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Upg901A.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Upgrade.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\Upgrade.xml (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\YUV9415.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\YUVProcess.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\cal8412.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\calib.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\gdi85CC.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\gdiplus.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\hpr.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\hpr8777.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\ico87D7.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\iconv.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qdd97B4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qdd97C5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qdd97D5.tmp
|
MSVC program database ver 7.00, 4096*387 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qdds.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qddsd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qddsd.pdb (copy)
|
MSVC program database ver 7.00, 4096*387 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qgi9815.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qgi9826.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qgi9836.tmp
|
MSVC program database ver 7.00, 4096*365 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qgif.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qgifd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qgifd.pdb (copy)
|
MSVC program database ver 7.00, 4096*365 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qic9885.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qic9896.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qic98B6.tmp
|
MSVC program database ver 7.00, 4096*379 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qic98F6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qic9916.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qic9927.tmp
|
MSVC program database ver 7.00, 4096*389 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qicns.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qicnsd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qicnsd.pdb (copy)
|
MSVC program database ver 7.00, 4096*379 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qico.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qicod.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qicod.pdb (copy)
|
MSVC program database ver 7.00, 4096*389 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qjp9985.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qjp99A6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qjp99E5.tmp
|
MSVC program database ver 7.00, 4096*529 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qjpeg.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qjpegd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qjpegd.pdb (copy)
|
MSVC program database ver 7.00, 4096*529 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qsv9A34.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qsv9A54.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qsv9A84.tmp
|
MSVC program database ver 7.00, 4096*401 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qsvg.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qsvgd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qsvgd.pdb (copy)
|
MSVC program database ver 7.00, 4096*401 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtg9B02.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtg9B13.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtg9B24.tmp
|
MSVC program database ver 7.00, 4096*379 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtga.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtgad.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtgad.pdb (copy)
|
MSVC program database ver 7.00, 4096*379 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qti9B63.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qti9B93.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qti9BB3.tmp
|
MSVC program database ver 7.00, 4096*583 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtiff.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtiffd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qtiffd.pdb (copy)
|
MSVC program database ver 7.00, 4096*583 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwb9C22.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwb9C32.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwb9C43.tmp
|
MSVC program database ver 7.00, 4096*353 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwbmp.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwbmpd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwbmpd.pdb (copy)
|
MSVC program database ver 7.00, 4096*353 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwe9CA2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwe9CB2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwe9CE2.tmp
|
MSVC program database ver 7.00, 4096*639 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwebp.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwebpd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\imageformats\qwebpd.pdb (copy)
|
MSVC program database ver 7.00, 4096*639 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\lib8816.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\libxml2.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qmi9E6A.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qmi9E7A.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qmi9F08.tmp
|
MSVC program database ver 7.00, 4096*701 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qminimal.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qminimald.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qminimald.pdb (copy)
|
MSVC program database ver 7.00, 4096*701 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qofA0BE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qofA0FE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qofA16C.tmp
|
MSVC program database ver 7.00, 4096*1307 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qoffscreen.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qoffscreend.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qoffscreend.pdb (copy)
|
MSVC program database ver 7.00, 4096*1307 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qwiA296.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qwiA2F5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qwiA344.tmp
|
MSVC program database ver 7.00, 4096*3135 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qwindows.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qwindowsd.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\platforms\qwindowsd.pdb (copy)
|
MSVC program database ver 7.00, 4096*3135 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\skins\ComA87F.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\skins\ComA8AE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\skins\CommonSkin.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\skins\CommonSkin_D.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\styles\ComA8DE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\styles\ComA8DF.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\styles\CommonStyle.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\plugins\styles\CommonStyle_D.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA549.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA579.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA5B8.tmp
|
MSVC program database ver 7.00, 4096*807 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA636.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA647.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA657.tmp
|
MSVC program database ver 7.00, 4096*483 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA6B6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA6D6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA6E7.tmp
|
MSVC program database ver 7.00, 4096*423 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlite.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlited.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlited.pdb (copy)
|
MSVC program database ver 7.00, 4096*807 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlmysql.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlmysqld.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlmysqld.pdb (copy)
|
MSVC program database ver 7.00, 4096*483 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlpsql.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlpsqld.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlpsqld.pdb (copy)
|
MSVC program database ver 7.00, 4096*423 bytes
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocA736.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocA747.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocA757.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocA768.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayBack_en.ts (copy)
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayBack_zh.ts (copy)
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayback_en.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayback_zh.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7A9.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7AA.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7BB.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7BC.tmp
|
XML 1.0 document, Unicode text, UTF-8 text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7CD.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7CE.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7DE.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\TooA7DF.tmp
|
XML 1.0 document, Unicode text, UTF-8 text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_en.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_en.ts (copy)
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_zh.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_zh.ts (copy)
|
XML 1.0 document, Unicode text, UTF-8 text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_en.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_en.ts (copy)
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_zh.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_zh.ts (copy)
|
XML 1.0 document, Unicode text, UTF-8 text
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\qt_A788.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\qt_A789.tmp
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\qt_en.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\translations\qt_zh_CN.qm (copy)
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\vcr902B.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\vcr92EB.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\vcredist_x64_2013.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\vcredist_x86.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\zli9454.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\LocalPlayback\zlib1.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LocalPlayback\Local Playback User Manual.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Thu Oct 24 11:56:22 2024, mtime=Thu Oct 24 11:56:22 2024, atime=Fri Nov 2 14:23:02 2018, length=1163462, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LocalPlayback\LocalPlayback.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Thu Oct 24 11:56:07 2024, mtime=Thu Oct 24 11:56:07 2024, atime=Fri Nov 2 14:29:04 2018, length=1877776, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LocalPlayback\Uninstall LocalPlayback.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Icon number=0, Archive, ctime=Thu
Oct 24 11:56:05 2024, mtime=Thu Oct 24 11:56:05 2024, atime=Fri Nov 2 14:29:06 2018, length=1191936, window=hide
|
modified
|
||
C:\ProgramData\Package Cache\{1b103cea-f037-4504-81de-956057b442c3}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{1b103cea-f037-4504-81de-956057b442c3}\vcredist_x64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\corecomp.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dotnetinstaller.exe (copy)
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dotnetinstaller.exe.config (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\DIFxData.ini
(copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\FontData.ini
(copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Setup.xml
(copy)
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\StringTable_0x0409.ips
(copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\_isres_0x0409.dll
(copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\default.pal
(copy)
|
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\isrt.dll
(copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\license.rtf
(copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1054
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.inx
(copy)
|
data
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe
(copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe
(copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Desktop\LocalPlayback.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Thu Oct 24 11:56:07 2024, mtime=Thu Oct 24 11:56:22 2024, atime=Fri Nov 2 14:29:04 2018, length=1877776, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8823.tmp
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20241024085557.log
|
ASCII text, with very long lines (366), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20241024085557_0_vcRuntimeMinimum_x64.log
|
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20241024085557_1_vcRuntimeAdditional_x64.log
|
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085549.log
|
ASCII text, with very long lines (361), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085549_0_vcRuntimeMinimum_x86.log
|
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085549_1_vcRuntimeAdditional_x86.log
|
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085603.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\BootstrapperApplicationData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\logo.png
|
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\thm.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\wixstdba.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.be\vcredist_x64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\cab2C04DDC374BD96EB5C8EB8208F2C7C92
|
Microsoft Cabinet archive data, 5572128 bytes, 14 files, at 0x44 +A "F_CENTRAL_mfc120_x64" +A "F_CENTRAL_mfc120chs_x64", flags
0x4, number 1, extra bytes 20 in head, 369 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\cab5046A8AB272BF37297BB7928664C9503
|
Microsoft Cabinet archive data, 1018378 bytes, 5 files, at 0x44 +A "F_CENTRAL_msvcp120_x64" +A "F_CENTRAL_msvcr120_x64", flags
0x4, number 1, extra bytes 20 in head, 80 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\vcRuntimeAdditional_x64
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last
Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\vcRuntimeMinimum_x64
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last
Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISB8A8F.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\cor8A2E.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dot8A6E.tmp
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dot8A7E.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\DIF8A2D.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Fon8A1D.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Set8864.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Setup.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Str8AA0.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\_is8AD2.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\def8AC1.tmp
|
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\isr8AA1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\lic8854.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1054
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set8843.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcr8865.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcr8951.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\0x0409.ini
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\0x0804.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\0x0409.ini
|
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\0x0804.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\ISSetup.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\data1.cab
|
InstallShield CAB
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\data1.hdr
|
InstallShield CAB
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\layout.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\setup.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\setup.inx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\setup.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\BootstrapperApplicationData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (560), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\logo.png
|
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\thm.wxl
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\thm.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\wixstdba.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.be\vcredist_x86.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\cab54A5CABBE7274D8A22EB58060AAB7623
|
Microsoft Cabinet archive data, many, 980926 bytes, 5 files, at 0x44 +A "F_CENTRAL_msvcp120_x86" +A "F_CENTRAL_msvcr120_x86",
flags 0x4, number 1, extra bytes 20 in head, 66 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\cabB3E1576D1FEFBB979E13B1A5379E0B16
|
Microsoft Cabinet archive data, 4916768 bytes, 14 files, at 0x44 +A "F_CENTRAL_mfc120_x86" +A "F_CENTRAL_mfc120chs_x86", flags
0x4, number 1, extra bytes 20 in head, 296 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\vcRuntimeAdditional_x86
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005.,
Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013,
Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\vcRuntimeMinimum_x86
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005.,
Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013,
Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c8c.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005.,
Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013,
Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c8f.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005.,
Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013,
Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c90.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005.,
Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013,
Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c93.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005.,
Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013,
Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c94.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last
Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c97.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last
Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c98.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last
Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c4c9b.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last
Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI4E9F.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI53FF.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI6BFD.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI7005.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
modified
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\SysWOW64\mfc120chs.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120cht.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120deu.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120enu.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120esn.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120fra.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120ita.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120jpn.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120kor.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc120rus.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\vcamp120.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\vcomp120.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120chs.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120cht.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120deu.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120enu.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120esn.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120fra.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120ita.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120jpn.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120kor.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120rus.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vcamp120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vcomp120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\~DF000369B7BB1DD334.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF0B2410DF9F7DD12C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF0DB6E3F7990A05D9.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF10071166B599346F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF11191F65FA51981A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF169ADE7E6BE4F80C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF1716C4667B531A4B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF18AF089E9E5D6D31.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF19ACBD4DD4DF1121.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF1A0FF75DC1117746.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF1A139A91E83B931A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2432138DF0145C0F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF2BC60ABEB47811EC.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF2ED80F8E0B5F360B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF3F6B0D23C3FC00E1.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF42F9C4F0203B0018.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF4F906C13DE5C216E.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF536340503EFC7231.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF60705592BCC68C90.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6303E8343006DCDB.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF64227C3C94EA9FE2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7414FE3A4A137E10.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF76FF6C876C0BFD74.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF81ECD322F8600CAE.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF838D95FF5FB04A90.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8E36FD6CB8A575BE.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF90FF957E69F6F381.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF96FDBFF93CCD201D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF973B7E94CBE79E86.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF99B886D60B172568.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA05BF038CE6D6269.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA9AA057EB6B64714.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB437754F3BABA584.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB82E0EFE2FC85EEF.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB9934FBE80B3F0CD.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFBA3DB368CD8DA69E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC2A31685B11C92E5.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC31C196470DB2464.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC34936F97E5E09E5.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC585B2E7668878CD.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD33D888942A41EC2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD5101CE646CC83AA.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFE1DC9EE30FB3F35C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE23309FEAC57690D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFEE14A837D8DC3E62.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFEF4EE7FC4F89C8E6.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF68D72E0B4DBD16D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFE0F8D2EA7A0DB91.TMP
|
data
|
dropped
|
There are 446 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LocalPlayback.exe
|
"C:\Users\user\Desktop\LocalPlayback.exe"
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
|
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0F60EF52-B8AE-4C65-B672-4ECBA9C7EF64}
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
|
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DEBE9773-6CCB-402A-A045-44F23FC2C3BA}
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
|
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E46B7176-3FFC-40C6-B559-180C9F23E714}
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
|
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E5BF0CED-81A6-4ECC-9E75-24C1C03367D2}
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
|
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{83415305-25EC-4DB0-8231-2F0B7AC0579F}
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
|
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3309AE38-3356-4998-B51D-DDEA1CA316CD}
|
||
C:\Windows\System32\SrTasks.exe
|
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe
|
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe
/q
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe
|
"C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe"
/q -burn.unelevated BurnPipe.{DBEA4BDC-32D1-4571-8C40-9D2304124BE9} {91C7A57E-FB61-4624-AACC-1188F529C9A7} 8120
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe
|
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe
/q
|
||
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe
|
"C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe"
/q -burn.unelevated BurnPipe.{0942DD9A-AF4A-432E-BD2D-A92FFBEDB9E9} {F3730AF5-9EE5-4B54-A568-50E8BA9679B4} 1876
|
||
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe
|
"C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe" /burn.runonce
|
||
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe
|
"C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe"
|
||
C:\Program Files (x86)\LocalPlayback\LocalPlayback.exe
|
"C:\Program Files (x86)\LocalPlayback\LocalPlayback.exe"
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.phreedom.org/md5)
|
unknown
|
||
http://=0x%04x.iniMS
|
unknown
|
||
http://www.phreedom.org/md5)08:27
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010
|
unknown
|
||
http://ns.adobe.co
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
http://www.company.comt
|
unknown
|
||
http://qt-project.org/xml/features/report-whitespace-only-CharData
|
unknown
|
||
http://www.hikvision.comX
|
unknown
|
||
http://xml.org/sax/features/namespaces
|
unknown
|
||
http://deviis4.installshield.com/NetNirvana/m
|
unknown
|
||
http://hikdownload.hik-connect.com/4200/tool/windows/LocalPlayback/v/standard/en/LocalPlayback
|
unknown
|
||
http://xml.org/sax/features/namespaceshttp://xml.org/sax/features/namespace-prefixeshttp://trolltech
|
unknown
|
||
http://deviis4.installshield.com/NetNirvana/
|
unknown
|
||
http://xml.org/sax/features/namespace-prefixes
|
unknown
|
||
http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
|
unknown
|
||
http://bugreports.qt.io/
|
unknown
|
||
http://hikdownload.hik-connect.com/4200/tool/windows/LocalPlayback/v/standard/en/LocalPlayback.exeF
|
unknown
|
||
http://www.hikvision.comCT
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010cessR
|
unknown
|
||
http://www.hikvision.comER
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://www.hikvision.comal
|
unknown
|
||
http://www.hikvision.com
|
unknown
|
||
http://www.hikvision.com4
|
unknown
|
||
http://qt-project.org/xml/features/report-start-end-entity
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010o
|
unknown
|
||
http://trolltech.com/xml/features/report-start-end-entity
|
unknown
|
||
http://www.hikvision.coml=%ld
|
unknown
|
||
http://www.company.com
|
unknown
|
||
http://trolltech.com/xml/features/report-whitespace-only-CharData
|
unknown
|
||
http://bugreports.qt.io/finishedServerMicrosoft-IIS/4.Microsoft-IIS/5.Netscape-Enterprise/3.WebLogic
|
unknown
|
||
http://hikdownload.hik-connect.com/4200/tool/windows/LocalPlayback/v/standard/en/LocalPlayback.exe
|
unknown
|
||
http://hikdownload.hik-connect.com.pngloseView.pngr.Q
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
hikdownload.hik-connect.com
|
49.51.129.211
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
49.51.129.211
|
hikdownload.hik-connect.com
|
China
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIError
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIResult
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
FirstRun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
StartNesting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
SRInitDone
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Leave)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
LogFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
ProductGuid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
RegOwner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
|
LogMode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
RPSessionInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
StartNesting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleCachePath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleUpgradeCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleAddonCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleDetectCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundlePatchCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleProviderKey
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleTag
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
EngineVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
NoElevateOnModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
Resume
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
{f65db027-aff3-4070-886a-0d87064aabb1}
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
BundleResumeCommandLine
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
|
Resume
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c8e.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c8e.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7CAA08EF3739B543C898104D5339838F
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vcamp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\345CD80E7ADAB6646B92EC09D89DDB3E
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vcomp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3D4577A1B447A9342B48DBA7C142CFAF
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\64D33A20AABB1EA31BF893B0436FD952
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3CC85108644EEB3AA9E1CC5CB146DD7
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C7CA8F6AFF2E883CBEF81E616CA4B73
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
|
Major
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
|
Minor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
|
Bld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
|
Rbld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\1FB5F95B8C762083E895C25E153AF95C
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1FB5F95B8C762083E895C25E153AF95C
|
21EE4A31AE32173319EEFE3BD6FDFFE3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList
|
LastUsedSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c92.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c92.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\12A184D1F34C9B830B1D0E09DFD26234
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120cht.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1B4424E8F8F60AE4CAA643D67EFC970A
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120chs.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\04227BBBA6F818A44ABA7B7FEFE2496C
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120enu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7309AD69569C54C42AC77E268345112F
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120deu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6FAD7EE0916644F428B74920FE352AD4
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120esn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4C3045C250CA36498FBCA0172083495
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120fra.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D0AFBC2DFFBF964C966EB1DAC5BB10A
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120ita.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3601DD9224EF594A96BA741F92B285B
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120jpn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2132BA00EBB72C42A7026C487984B6D
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120kor.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\109A3AD6210E2E248B91AD3F87EBB4FE
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120rus.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E03DDD0940D9F144893096F40883A78E
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\64D33A20AABB1EA31BF893B0436FD952
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6764CC2991A26973DAE5976895576F3F
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\13FB0C7B0049A443FAE4A93AA7FAB407
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\B696E639D8C084A389FD43F4AEE41193
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
VC_Runtime_Additional
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
|
VC_Runtime_Additional
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B696E639D8C084A389FD43F4AEE41193
|
22BEFC8F7E2A1793E9ADB411DEFE1C58
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList
|
LastUsedSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c96.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c96.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1924F1CBA0F6BE8389E42C5E5538F71E
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\vcamp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F6A327C410298D44EB570EB8D501F458
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\vcomp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1A8F0AFED61F44E4E84EC28DE6D1214F
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\651B38B7BBE8F03319CAA27790912C9C
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E1A20017605E45A3CAE5DF61A6FC01C0
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Major
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Minor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Bld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Rbld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
|
LastUsedSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c9a.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c4c9a.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4ED6E1912B7E9EC34BB8520DFF3F8DE8
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120cht.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52939EBA3FB6849409FFE1D41FB52B1D
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120chs.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\212F32761495F3A40A7C6D06026C9774
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120enu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AC418779B85FEBA4AB8BD656FFE16834
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120deu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B03A28739FC91464B88D752E8191270D
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120esn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1DF56FED5BB223A4E8C8E26B82D26C1C
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120fra.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A74805657EBC1D41A288A18C61CD783
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120ita.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\11D968317BDA58F44A517EE687079497
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120jpn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F284FEF8CCFFEDE4F9B8C16375F652D9
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120kor.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22FD453CD051C3946BA422364104DD50
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120rus.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D73E0AF5467CC934798AAF6082026BA5
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\485D7CCFE75F6DE38BC516CCE4521DD9
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D482454A6C77E73CBF71CFDCCB1C88F
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcr120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vccorlib120.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc120u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfcm120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfcm120u.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\msvcr120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\msvcp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\vccorlib120.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfcm120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfcm120u.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleCachePath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleUpgradeCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleAddonCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleDetectCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundlePatchCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleProviderKey
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleTag
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
EngineVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
NoElevateOnModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{1b103cea-f037-4504-81de-956057b442c3}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{1b103cea-f037-4504-81de-956057b442c3}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{1b103cea-f037-4504-81de-956057b442c3}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
Resume
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
{1b103cea-f037-4504-81de-956057b442c3}
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
BundleResumeCommandLine
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
|
Resume
|
There are 716 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6AD8C000
|
unkown
|
page readonly
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
6AD54000
|
unkown
|
page readonly
|
||
1E889551000
|
heap
|
page read and write
|
||
4864000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
353F000
|
heap
|
page read and write
|
||
6C8FF000
|
unkown
|
page readonly
|
||
2BAC000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
BC5B4FF000
|
stack
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
5C3F000
|
heap
|
page read and write
|
||
45CA000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
2DBE000
|
heap
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
F6F000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
6BC61000
|
unkown
|
page execute read
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
821000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
953000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
3269000
|
trusted library allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
30955FE000
|
stack
|
page read and write
|
||
32EF000
|
heap
|
page read and write
|
||
D65000
|
unkown
|
page readonly
|
||
1E7F87E0000
|
heap
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
1E88B200000
|
heap
|
page read and write
|
||
3E10000
|
trusted library allocation
|
page read and write
|
||
4603000
|
heap
|
page read and write
|
||
1C1B3146000
|
heap
|
page read and write
|
||
217F98E2000
|
heap
|
page read and write
|
||
5CB0000
|
heap
|
page read and write
|
||
5A38000
|
heap
|
page read and write
|
||
393E000
|
heap
|
page read and write
|
||
217FB3D0000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
heap
|
page read and write
|
||
6AEBF000
|
unkown
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
45B5000
|
heap
|
page read and write
|
||
1E889550000
|
heap
|
page read and write
|
||
5105000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
399B000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
6BB31000
|
unkown
|
page execute read
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
466F000
|
heap
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
700D0000
|
unkown
|
page readonly
|
||
F44000
|
heap
|
page read and write
|
||
2DEF000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
6B450000
|
unkown
|
page readonly
|
||
6AC4B000
|
unkown
|
page write copy
|
||
6AE90000
|
unkown
|
page readonly
|
||
82C000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
847000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
4976000
|
heap
|
page read and write
|
||
1E889715000
|
heap
|
page read and write
|
||
19F64F9000
|
stack
|
page read and write
|
||
6B3D2000
|
unkown
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
3ADF000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
5B9A000
|
heap
|
page read and write
|
||
5CAF000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
6B404000
|
unkown
|
page read and write
|
||
1E889541000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
1E7F87E5000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
3EA000
|
unkown
|
page readonly
|
||
6ACC1000
|
unkown
|
page execute read
|
||
63F000
|
heap
|
page read and write
|
||
2B9C000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
3EA000
|
unkown
|
page readonly
|
||
1CC5E7E0000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
7004B000
|
unkown
|
page readonly
|
||
99000
|
stack
|
page read and write
|
||
1CC5CF45000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
1522000
|
trusted library allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page execute read
|
||
811000
|
heap
|
page read and write
|
||
45E9000
|
heap
|
page read and write
|
||
353F000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4AD000
|
unkown
|
page readonly
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
2D92000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
52FD000
|
heap
|
page read and write
|
||
2363832E000
|
heap
|
page read and write
|
||
5CA2000
|
heap
|
page read and write
|
||
1F7861B8000
|
heap
|
page read and write
|
||
6BCD5000
|
unkown
|
page readonly
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
5C16000
|
heap
|
page read and write
|
||
5CB1000
|
heap
|
page read and write
|
||
F4E000
|
heap
|
page read and write
|
||
F4E000
|
heap
|
page read and write
|
||
5C1D000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page execute read
|
||
833000
|
heap
|
page read and write
|
||
5A7C000
|
heap
|
page read and write
|
||
120F000
|
unkown
|
page readonly
|
||
2B84000
|
heap
|
page read and write
|
||
1272000
|
unkown
|
page read and write
|
||
1CC5E990000
|
heap
|
page read and write
|
||
2D2E000
|
heap
|
page read and write
|
||
5AB000
|
stack
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
1E88B3F2000
|
trusted library allocation
|
page read and write
|
||
6FF59000
|
unkown
|
page readonly
|
||
3900000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
6C1B4000
|
unkown
|
page readonly
|
||
1CC5CF20000
|
heap
|
page read and write
|
||
3463000
|
heap
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
D63000
|
unkown
|
page write copy
|
||
2B2C000
|
stack
|
page read and write
|
||
10ED000
|
stack
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
F8E000
|
heap
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
6ACB1000
|
unkown
|
page execute read
|
||
5A2C000
|
heap
|
page read and write
|
||
6B22A000
|
unkown
|
page write copy
|
||
F88000
|
heap
|
page read and write
|
||
9CD000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
2C12000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page execute read
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
5A92000
|
heap
|
page read and write
|
||
7FD000
|
stack
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
23638240000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
6AC65000
|
unkown
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
9BD000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
1E889505000
|
heap
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
2BF1000
|
heap
|
page read and write
|
||
390C000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
4868000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
326E000
|
trusted library allocation
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
5C27000
|
heap
|
page read and write
|
||
2D0C000
|
heap
|
page read and write
|
||
45B8000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
1E8894F7000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
5C4B000
|
heap
|
page read and write
|
||
6B3B1000
|
unkown
|
page execute read
|
||
2B83000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
5BD4000
|
heap
|
page read and write
|
||
3921000
|
trusted library allocation
|
page read and write
|
||
1200000
|
unkown
|
page readonly
|
||
2BF1000
|
heap
|
page read and write
|
||
217F98E1000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
217F98D3000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
3E26000
|
heap
|
page read and write
|
||
37FB000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
456C000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
5A7C000
|
heap
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
23638336000
|
heap
|
page read and write
|
||
5AA9000
|
heap
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
2DDE000
|
heap
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
5A59000
|
heap
|
page read and write
|
||
6ACB7000
|
unkown
|
page read and write
|
||
1CC5CF44000
|
heap
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
5C48000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
5C4B000
|
heap
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
5B9A000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
EF6000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
2C58000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
3474000
|
heap
|
page read and write
|
||
6BB11000
|
unkown
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
5C6D000
|
heap
|
page read and write
|
||
892000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
2F8C000
|
trusted library allocation
|
page read and write
|
||
FC9DCFE000
|
stack
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
12E1000
|
unkown
|
page readonly
|
||
83B000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
6B190000
|
unkown
|
page readonly
|
||
6AC2A000
|
unkown
|
page readonly
|
||
2F50000
|
heap
|
page read and write
|
||
5BBB000
|
heap
|
page read and write
|
||
2E0E000
|
heap
|
page read and write
|
||
4AD000
|
unkown
|
page readonly
|
||
32A0000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
6B42D000
|
unkown
|
page readonly
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
4657000
|
heap
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
2B7D000
|
heap
|
page read and write
|
||
465A000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
2230000
|
heap
|
page read and write
|
||
F6A000
|
unkown
|
page readonly
|
||
652000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
37DA000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E7F6DD0000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
81F000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
2E6C000
|
heap
|
page read and write
|
||
99B000
|
stack
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
6AE93000
|
unkown
|
page readonly
|
||
158E000
|
heap
|
page read and write
|
||
326A000
|
trusted library allocation
|
page read and write
|
||
6AEC3000
|
unkown
|
page readonly
|
||
5A7F000
|
heap
|
page read and write
|
||
1E88954C000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
6AC61000
|
unkown
|
page execute read
|
||
6ADC0000
|
unkown
|
page read and write
|
||
5A2C000
|
heap
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
5B9A000
|
heap
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
157D000
|
heap
|
page read and write
|
||
4810000
|
trusted library section
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
2C24000
|
heap
|
page read and write
|
||
6AC60000
|
unkown
|
page readonly
|
||
F44000
|
heap
|
page read and write
|
||
5BBD000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
5AEA000
|
heap
|
page read and write
|
||
1930000
|
heap
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
23638336000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
6B228000
|
unkown
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
BC5B7FE000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
1F787AA5000
|
heap
|
page read and write
|
||
6BC57000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
86F000
|
heap
|
page read and write
|
||
1205000
|
unkown
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
5A7C000
|
heap
|
page read and write
|
||
5B31000
|
heap
|
page read and write
|
||
6ADD0000
|
unkown
|
page readonly
|
||
85A000
|
heap
|
page read and write
|
||
1E889562000
|
heap
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
350D000
|
heap
|
page read and write
|
||
3907000
|
heap
|
page read and write
|
||
6ACE3000
|
unkown
|
page readonly
|
||
1F7861A6000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E8896C0000
|
heap
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
5BEC000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
5FF0000
|
heap
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1E7F6E60000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
1C1B3166000
|
heap
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
2D95000
|
heap
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
1E8894F6000
|
heap
|
page read and write
|
||
2C71000
|
heap
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
873000
|
heap
|
page read and write
|
||
217FB300000
|
heap
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
FC9D7FF000
|
stack
|
page read and write
|
||
5B1F000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
70041000
|
unkown
|
page execute read
|
||
2BD0000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
3E2F000
|
heap
|
page read and write
|
||
2BAA000
|
heap
|
page read and write
|
||
2374000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
2D15000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
7FF75D286000
|
unkown
|
page write copy
|
||
6AD4A000
|
unkown
|
page readonly
|
||
1CC5CF26000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
23638160000
|
heap
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
5348000
|
heap
|
page read and write
|
||
1E88B3F0000
|
trusted library allocation
|
page read and write
|
||
3D10000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
3502000
|
heap
|
page read and write
|
||
5A6B000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
F64000
|
unkown
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
5B15000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
1E88B40D000
|
trusted library allocation
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
2A87000
|
trusted library allocation
|
page read and write
|
||
2ADA000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
6BCCB000
|
unkown
|
page readonly
|
||
83F000
|
heap
|
page read and write
|
||
120B000
|
unkown
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
DE3000
|
unkown
|
page readonly
|
||
2D9F000
|
heap
|
page read and write
|
||
5A7D000
|
heap
|
page read and write
|
||
5C1D000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
15D2000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
45A1000
|
heap
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
812000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
7FF75D286000
|
unkown
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
FEC000
|
stack
|
page read and write
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
5C48000
|
heap
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
6ABF3000
|
unkown
|
page readonly
|
||
1CC5CF21000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
BC5B3FE000
|
stack
|
page read and write
|
||
1C1B3120000
|
heap
|
page read and write
|
||
1EB000
|
stack
|
page read and write
|
||
CB1EEFB000
|
stack
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
5ADA000
|
heap
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
2C23000
|
heap
|
page read and write
|
||
2DBF000
|
heap
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
5C2F000
|
heap
|
page read and write
|
||
5A42000
|
heap
|
page read and write
|
||
30954FE000
|
stack
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
456D000
|
heap
|
page read and write
|
||
34A7000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
1E88B40B000
|
trusted library allocation
|
page read and write
|
||
5A4A000
|
heap
|
page read and write
|
||
1267000
|
unkown
|
page readonly
|
||
45A0000
|
heap
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
61F0000
|
heap
|
page read and write
|
||
2BF3000
|
heap
|
page read and write
|
||
5C68000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
2DAD000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
3E2A000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
1F786140000
|
heap
|
page read and write
|
||
5CA2000
|
heap
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
1E88B40E000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
2BC7000
|
heap
|
page read and write
|
||
18A0000
|
unkown
|
page read and write
|
||
456E000
|
heap
|
page read and write
|
||
1CC5CF43000
|
heap
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
3916000
|
trusted library allocation
|
page read and write
|
||
3EA000
|
unkown
|
page readonly
|
||
4563000
|
heap
|
page read and write
|
||
19F66FF000
|
stack
|
page read and write
|
||
183E000
|
stack
|
page read and write
|
||
3505000
|
heap
|
page read and write
|
||
217F9904000
|
heap
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
D23000
|
heap
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
102CA000
|
unkown
|
page readonly
|
||
2C00000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
5C3F000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
F64000
|
unkown
|
page write copy
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
3EA000
|
unkown
|
page readonly
|
||
583E000
|
stack
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
6ACE0000
|
unkown
|
page readonly
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
27E0000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
6ACB0000
|
unkown
|
page readonly
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
2C58000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
82C000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
459E000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
3BD4000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1E8894F6000
|
heap
|
page read and write
|
||
2C2B000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
6AD44000
|
unkown
|
page readonly
|
||
83B000
|
heap
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
2ADC000
|
trusted library allocation
|
page read and write
|
||
7FF75D286000
|
unkown
|
page write copy
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
6ACC9000
|
unkown
|
page readonly
|
||
6B22B000
|
unkown
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
3ABB000
|
heap
|
page read and write
|
||
2B13000
|
heap
|
page read and write
|
||
6B524000
|
unkown
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
6AD61000
|
unkown
|
page readonly
|
||
831000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
2192000
|
trusted library allocation
|
page read and write
|
||
3094D8C000
|
stack
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
33C000
|
stack
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
3D20000
|
heap
|
page read and write
|
||
217FB3D5000
|
heap
|
page read and write
|
||
534A000
|
heap
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
6C8F8000
|
unkown
|
page readonly
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
1CC5CF30000
|
heap
|
page read and write
|
||
1F7861C7000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
5C6D000
|
heap
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
23638300000
|
heap
|
page read and write
|
||
1E8895C0000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
5A38000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
1E8894F6000
|
heap
|
page read and write
|
||
23638270000
|
heap
|
page read and write
|
||
217F98F2000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
A87E37E000
|
stack
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
11F0000
|
unkown
|
page readonly
|
||
F44000
|
heap
|
page read and write
|
||
2C1B000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
7004A000
|
unkown
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
1E889513000
|
heap
|
page read and write
|
||
45B9000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
36A0000
|
heap
|
page read and write
|
||
5C68000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
44A000
|
unkown
|
page readonly
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
4569000
|
heap
|
page read and write
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
2ADD000
|
trusted library allocation
|
page read and write
|
||
5C6D000
|
heap
|
page read and write
|
||
15B7000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
3A2A000
|
heap
|
page read and write
|
||
2A89000
|
trusted library allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
5A28000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
1C1B3178000
|
heap
|
page read and write
|
||
93F000
|
stack
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
2AE3000
|
trusted library allocation
|
page read and write
|
||
1CC5CF32000
|
heap
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
C3D000
|
unkown
|
page execute read
|
||
86D000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
5C0E000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
1C1B4B40000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
6B44F000
|
unkown
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
A87DEBA000
|
stack
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
19F65FE000
|
stack
|
page read and write
|
||
5C3F000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
2DB7000
|
heap
|
page read and write
|
||
464F000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
2B48000
|
heap
|
page read and write
|
||
6AD50000
|
unkown
|
page readonly
|
||
21A0000
|
direct allocation
|
page execute and read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
5CAA000
|
heap
|
page read and write
|
||
5CA2000
|
heap
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
7FF75D286000
|
unkown
|
page write copy
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
3452000
|
heap
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
197A000
|
heap
|
page read and write
|
||
2C8B000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
45C5000
|
heap
|
page read and write
|
||
6C8FE000
|
unkown
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
808000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
6C7FA000
|
unkown
|
page readonly
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
1F786180000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
2CA8000
|
heap
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
6AC66000
|
unkown
|
page readonly
|
||
840000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
6610000
|
heap
|
page read and write
|
||
1E8896A0000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
2CEF000
|
heap
|
page read and write
|
||
10326000
|
unkown
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
38AB000
|
heap
|
page read and write
|
||
217F98E7000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
5C48000
|
heap
|
page read and write
|
||
6ACB8000
|
unkown
|
page readonly
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
2DA1000
|
heap
|
page read and write
|
||
391C000
|
heap
|
page read and write
|
||
5BAA000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
1202000
|
unkown
|
page read and write
|
||
5BB3000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
6B8F5000
|
unkown
|
page readonly
|
||
2E30000
|
heap
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
508000
|
unkown
|
page readonly
|
||
62D000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
1F7861AE000
|
heap
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
3922000
|
trusted library allocation
|
page read and write
|
||
30EC000
|
stack
|
page read and write
|
||
7FF75D286000
|
unkown
|
page write copy
|
||
3B0D000
|
heap
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
2ACE000
|
stack
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
2C44000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
2C23000
|
heap
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
1F7861BB000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
6B3F9000
|
unkown
|
page readonly
|
||
5C10000
|
heap
|
page read and write
|
||
2DBE000
|
heap
|
page read and write
|
||
5C1D000
|
heap
|
page read and write
|
||
3910000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
4E6000
|
heap
|
page read and write
|
||
5C68000
|
heap
|
page read and write
|
||
2C27000
|
heap
|
page read and write
|
||
2BE3000
|
heap
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
heap
|
page read and write
|
||
6BCE0000
|
unkown
|
page readonly
|
||
1F7861C9000
|
heap
|
page read and write
|
||
217F9902000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
7FF75D28A000
|
unkown
|
page read and write
|
||
2DA5000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
358A000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
3C1F000
|
stack
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
6C351000
|
unkown
|
page execute read
|
||
2D60000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
2DBE000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
D62000
|
unkown
|
page write copy
|
||
4638000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
1E88B40F000
|
trusted library allocation
|
page read and write
|
||
2DAD000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
102A0000
|
unkown
|
page readonly
|
||
1567000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1970000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
1E7F6EA3000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E889543000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
3B1B000
|
heap
|
page read and write
|
||
2BBC000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
7FF75D286000
|
unkown
|
page read and write
|
||
2B9D000
|
heap
|
page read and write
|
||
467B000
|
heap
|
page read and write
|
||
45E8000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
1E889543000
|
heap
|
page read and write
|
||
1E88B3F7000
|
trusted library allocation
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
1E88B0E4000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
6AC4D000
|
unkown
|
page readonly
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
6C8E1000
|
unkown
|
page execute read
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
6B528000
|
unkown
|
page readonly
|
||
824000
|
heap
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
5C68000
|
heap
|
page read and write
|
||
6ABDE000
|
unkown
|
page read and write
|
||
467E000
|
heap
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
6C915000
|
unkown
|
page readonly
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
1E8894C8000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1E889543000
|
heap
|
page read and write
|
||
1F7861CB000
|
heap
|
page read and write
|
||
5B18000
|
heap
|
page read and write
|
||
6BED1000
|
unkown
|
page readonly
|
||
5A49000
|
heap
|
page read and write
|
||
F6A000
|
unkown
|
page readonly
|
||
F13000
|
heap
|
page read and write
|
||
2DAD000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
3EA0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page readonly
|
||
B8E000
|
stack
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
1C1B3165000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CC5E7E5000
|
heap
|
page read and write
|
||
6B398000
|
unkown
|
page read and write
|
||
6AC70000
|
unkown
|
page readonly
|
||
404000
|
unkown
|
page write copy
|
||
530000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
217F98F0000
|
heap
|
page read and write
|
||
1F7861BB000
|
heap
|
page read and write
|
||
D61000
|
unkown
|
page readonly
|
||
7CB000
|
heap
|
page read and write
|
||
3E24000
|
heap
|
page read and write
|
||
872000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
D2A000
|
unkown
|
page execute read
|
||
F88000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
2DAD000
|
heap
|
page read and write
|
||
6C305000
|
unkown
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
158E000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page readonly
|
||
884000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
1E8893C0000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1C1B314C000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
6C30C000
|
unkown
|
page readonly
|
||
81A000
|
heap
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
heap
|
page read and write
|
||
2A84000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
F6A000
|
unkown
|
page readonly
|
||
82C000
|
heap
|
page read and write
|
||
1E88B0EF000
|
heap
|
page read and write
|
||
5C46000
|
heap
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
F4B000
|
heap
|
page read and write
|
||
3D00000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
675000
|
heap
|
page read and write
|
||
2BAB000
|
heap
|
page read and write
|
||
D64000
|
unkown
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
2A8A000
|
trusted library allocation
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
1C1B314C000
|
heap
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
37E2000
|
heap
|
page read and write
|
||
5CAF000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
1209000
|
unkown
|
page read and write
|
||
F56000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
42D0000
|
trusted library allocation
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
1F7861B8000
|
heap
|
page read and write
|
||
6201000
|
trusted library allocation
|
page read and write
|
||
3267000
|
trusted library allocation
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
6B227000
|
unkown
|
page write copy
|
||
848000
|
heap
|
page read and write
|
||
EF3000
|
heap
|
page read and write
|
||
217F9906000
|
heap
|
page read and write
|
||
5C16000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
7FF75D28A000
|
unkown
|
page read and write
|
||
157F000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
2C6E000
|
heap
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
5A49000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
6AD58000
|
unkown
|
page readonly
|
||
5AD1000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
812000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
464000
|
unkown
|
page write copy
|
||
2E49000
|
heap
|
page read and write
|
||
6B3D6000
|
unkown
|
page readonly
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
217F98C9000
|
heap
|
page read and write
|
||
8A2000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
6BC60000
|
unkown
|
page readonly
|
||
1E8894F7000
|
heap
|
page read and write
|
||
1F7861B8000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
5C3A000
|
heap
|
page read and write
|
||
40DB000
|
stack
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
5B31000
|
heap
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page read and write
|
||
1E88AEC0000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
2D92000
|
heap
|
page read and write
|
||
495E000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
929000
|
heap
|
page read and write
|
||
FC9DBFE000
|
stack
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
3E93000
|
heap
|
page read and write
|
||
5B9A000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
heap
|
page read and write
|
||
2DBA000
|
heap
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
6BB42000
|
unkown
|
page readonly
|
||
82E000
|
heap
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
6ABF0000
|
unkown
|
page readonly
|
||
1CC5CF31000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
32A1000
|
heap
|
page read and write
|
||
6BCCF000
|
unkown
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
3B68000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
1E889710000
|
heap
|
page read and write
|
||
29CC000
|
stack
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
6AB90000
|
unkown
|
page readonly
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
2D69000
|
heap
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
2BAA000
|
heap
|
page read and write
|
||
F4D000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
6BB12000
|
unkown
|
page readonly
|
||
27D0000
|
heap
|
page read and write
|
||
2DAD000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
540000
|
trusted library allocation
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
45A3000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
82C000
|
heap
|
page read and write
|
||
1569000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
1E88B3E0000
|
heap
|
page read and write
|
||
1F787A20000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
217F97F0000
|
heap
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
23638309000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
900000
|
unkown
|
page read and write
|
||
1E8894FE000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
1E7F8770000
|
heap
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
3208000
|
heap
|
page read and write
|
||
2C70000
|
trusted library section
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
heap
|
page read and write
|
||
5A57000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
1CC5CE10000
|
heap
|
page read and write
|
||
6BE0A000
|
unkown
|
page readonly
|
||
886000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
7F7000
|
heap
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
1C1B30F0000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
1F786060000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
30950FF000
|
stack
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
5B52000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
1E7F6EA3000
|
heap
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
3915000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
929000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
6B3C9000
|
unkown
|
page readonly
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
6BB0C000
|
unkown
|
page read and write
|
||
5B89000
|
heap
|
page read and write
|
||
1CC5CF30000
|
heap
|
page read and write
|
||
2CC3000
|
heap
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
7FF75D28A000
|
unkown
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
2BEF000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
51EC000
|
stack
|
page read and write
|
||
1CC5CF00000
|
heap
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page readonly
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1F786189000
|
heap
|
page read and write
|
||
2BBA000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
F79000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
2BC9000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
5C3A000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
A04000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
heap
|
page read and write
|
||
66C000
|
heap
|
page read and write
|
||
8C8000
|
stack
|
page read and write
|
||
5C1D000
|
heap
|
page read and write
|
||
5AC9000
|
heap
|
page read and write
|
||
4689000
|
heap
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
44A000
|
unkown
|
page readonly
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
1CC5D000000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
3262000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
809000
|
heap
|
page read and write
|
||
1F7861A6000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2F54000
|
heap
|
page read and write
|
||
2CB3000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
3918000
|
trusted library allocation
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
5C3A000
|
heap
|
page read and write
|
||
F8B000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
6974FC000
|
stack
|
page read and write
|
||
2BCD000
|
heap
|
page read and write
|
||
1E7F6EA1000
|
heap
|
page read and write
|
||
1E88B3F3000
|
trusted library allocation
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
1F7861BB000
|
heap
|
page read and write
|
||
6AC4A000
|
unkown
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
2BC7000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
2D91000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
CB1EFFF000
|
stack
|
page read and write
|
||
4672000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
23638330000
|
heap
|
page read and write
|
||
5A97000
|
heap
|
page read and write
|
||
5912000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
6ACA6000
|
unkown
|
page readonly
|
||
33A1000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
5A6A000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
236382A0000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
6B3B0000
|
unkown
|
page readonly
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
6AC63000
|
unkown
|
page readonly
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
7FF75D286000
|
unkown
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
2C9C000
|
heap
|
page read and write
|
||
39A0000
|
heap
|
page read and write
|
||
4815000
|
trusted library section
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
2FA0000
|
direct allocation
|
page execute and read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
6C306000
|
unkown
|
page write copy
|
||
5C41000
|
heap
|
page read and write
|
||
435B000
|
stack
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
2CFB000
|
heap
|
page read and write
|
||
236382A5000
|
heap
|
page read and write
|
||
5A39000
|
heap
|
page read and write
|
||
2BE8000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
391A000
|
trusted library allocation
|
page read and write
|
||
6ABF5000
|
unkown
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
5C44000
|
heap
|
page read and write
|
||
2B7F000
|
heap
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
6BB0F000
|
unkown
|
page read and write
|
||
2C4D000
|
heap
|
page read and write
|
||
3913000
|
trusted library allocation
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
1CC5CF26000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
6ADD1000
|
unkown
|
page execute read
|
||
808000
|
heap
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
1E88B407000
|
trusted library allocation
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
1E8894F7000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
6FF48000
|
unkown
|
page readonly
|
||
5CA7000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
45C6000
|
heap
|
page read and write
|
||
1E7F6E00000
|
heap
|
page read and write
|
||
264C000
|
heap
|
page read and write
|
||
5A10000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
5345000
|
heap
|
page read and write
|
||
23638325000
|
heap
|
page read and write
|
||
9BF000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
4562000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
6ABF6000
|
unkown
|
page readonly
|
||
F0C000
|
heap
|
page read and write
|
||
5A31000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
BC5B6FE000
|
stack
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
5C3A000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
4DB000
|
unkown
|
page readonly
|
||
809000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
2D15000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
1F7861A0000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
45AE000
|
heap
|
page read and write
|
||
CB1F3FE000
|
stack
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
1E8894E7000
|
heap
|
page read and write
|
||
6FF5C000
|
unkown
|
page read and write
|
||
6C910000
|
unkown
|
page readonly
|
||
5BCA000
|
heap
|
page read and write
|
||
5C6D000
|
heap
|
page read and write
|
||
2D2E000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
5C6D000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
5A4A000
|
heap
|
page read and write
|
||
F3C000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
6FF40000
|
unkown
|
page readonly
|
||
400F000
|
stack
|
page read and write
|
||
2BA5000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
23638336000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
159B000
|
heap
|
page read and write
|
||
217F9906000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
81E000
|
heap
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
5C4D000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
F4A000
|
unkown
|
page readonly
|
||
5AFD000
|
heap
|
page read and write
|
||
2610000
|
unkown
|
page read and write
|
||
842000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4635000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
4913000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1E88B407000
|
trusted library allocation
|
page read and write
|
||
19F6AFE000
|
stack
|
page read and write
|
||
1C1B316B000
|
heap
|
page read and write
|
||
45E8000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
1E88B0D0000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
D65000
|
unkown
|
page readonly
|
||
874000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
5B1F000
|
heap
|
page read and write
|
||
826000
|
heap
|
page read and write
|
||
1035F000
|
unkown
|
page write copy
|
||
7F6000
|
heap
|
page read and write
|
||
D2A000
|
unkown
|
page execute read
|
||
5AA9000
|
heap
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page execute read
|
||
2B30000
|
unkown
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
5C2F000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
298C000
|
stack
|
page read and write
|
||
6ACC0000
|
unkown
|
page readonly
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
2C9C000
|
heap
|
page read and write
|
||
5A7C000
|
heap
|
page read and write
|
||
5C16000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
30951FF000
|
stack
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
heap
|
page read and write
|
||
1E8894E2000
|
heap
|
page read and write
|
||
C3D000
|
unkown
|
page execute read
|
||
1F7861CB000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
2920000
|
direct allocation
|
page execute and read and write
|
||
1E7F6E85000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
6ADC1000
|
unkown
|
page readonly
|
||
1E889511000
|
heap
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
1F7861B0000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
7FF75D28A000
|
unkown
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
5362000
|
heap
|
page read and write
|
||
158E000
|
heap
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
700D1000
|
unkown
|
page execute read
|
||
3914000
|
trusted library allocation
|
page read and write
|
||
1E889550000
|
heap
|
page read and write
|
||
70047000
|
unkown
|
page readonly
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
FC9D6FC000
|
stack
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
1CC5CF09000
|
heap
|
page read and write
|
||
2F8E000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
F3C000
|
heap
|
page read and write
|
||
5B81000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
6ABE1000
|
unkown
|
page readonly
|
||
3BD4000
|
heap
|
page read and write
|
||
6BCBF000
|
unkown
|
page readonly
|
||
5A28000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
1E88B3F8000
|
trusted library allocation
|
page read and write
|
||
6B3E1000
|
unkown
|
page execute read
|
||
6B411000
|
unkown
|
page execute read
|
||
1560000
|
heap
|
page read and write
|
||
217F98C0000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
D7F000
|
unkown
|
page readonly
|
||
45AD000
|
heap
|
page read and write
|
||
6AC4C000
|
unkown
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
464C000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B408000
|
trusted library allocation
|
page read and write
|
||
1E889670000
|
heap
|
page read and write
|
||
15D3000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
3268000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
6BCE1000
|
unkown
|
page execute read
|
||
EC0000
|
heap
|
page read and write
|
||
882000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
2A83000
|
trusted library allocation
|
page read and write
|
||
D62000
|
unkown
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
6B39A000
|
unkown
|
page readonly
|
||
5C44000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
F4A000
|
unkown
|
page readonly
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
1569000
|
heap
|
page read and write
|
||
45B2000
|
heap
|
page read and write
|
||
6C8D0000
|
unkown
|
page readonly
|
||
6C8F3000
|
unkown
|
page execute read
|
||
82F000
|
heap
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
2BA9000
|
heap
|
page read and write
|
||
2D2E000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
heap
|
page read and write
|
||
2E07000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
6C919000
|
unkown
|
page readonly
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
heap
|
page read and write
|
||
6BFF000
|
stack
|
page read and write
|
||
3F9C000
|
stack
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
A87DFBF000
|
stack
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
heap
|
page read and write
|
||
2B83000
|
heap
|
page read and write
|
||
2C9C000
|
heap
|
page read and write
|
||
1C1B316B000
|
heap
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
5C68000
|
heap
|
page read and write
|
||
12DC000
|
unkown
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
F64000
|
unkown
|
page write copy
|
||
30AC000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
2D2E000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
2BB7000
|
heap
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
1F787AA0000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
10CF000
|
stack
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
2CA3000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E7F6EA0000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
44A000
|
unkown
|
page readonly
|
||
6B4F0000
|
unkown
|
page readonly
|
||
15B6000
|
heap
|
page read and write
|
||
6BB30000
|
unkown
|
page readonly
|
||
3917000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
1E7F6E80000
|
heap
|
page read and write
|
||
217F98E7000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
45B9000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
1C1B3146000
|
heap
|
page read and write
|
||
CB1F4FE000
|
stack
|
page read and write
|
||
2DDE000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
1E88B3F4000
|
trusted library allocation
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
5B20000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
1E889513000
|
heap
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
F11000
|
unkown
|
page execute read
|
||
6FF45000
|
unkown
|
page readonly
|
||
1C1B3010000
|
heap
|
page read and write
|
||
23638320000
|
heap
|
page read and write
|
||
353F000
|
heap
|
page read and write
|
||
6FB000
|
stack
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
3923000
|
trusted library allocation
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
6ACAC000
|
unkown
|
page readonly
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
6C30A000
|
unkown
|
page read and write
|
||
2C60000
|
trusted library section
|
page read and write
|
||
821000
|
heap
|
page read and write
|
||
1C1B3179000
|
heap
|
page read and write
|
||
2DBA000
|
heap
|
page read and write
|
||
2C50000
|
trusted library section
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5BD5000
|
heap
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
288C000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
326C000
|
trusted library allocation
|
page read and write
|
||
952000
|
heap
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
1E889543000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
2BD4000
|
heap
|
page read and write
|
||
689000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
5C16000
|
heap
|
page read and write
|
||
F64000
|
unkown
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
A87E3FF000
|
stack
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
2DB3000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
5C3F000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
1E7F6CF0000
|
heap
|
page read and write
|
||
D2C000
|
unkown
|
page readonly
|
||
400000
|
heap
|
page read and write
|
||
459B000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
930000
|
heap
|
page read and write
|
||
19F68FE000
|
stack
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
2BAF000
|
heap
|
page read and write
|
||
7FF75D28A000
|
unkown
|
page read and write
|
||
5C3B000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
82C000
|
heap
|
page read and write
|
||
6C8CD000
|
unkown
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1E88B0E0000
|
heap
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
6B205000
|
unkown
|
page readonly
|
||
4686000
|
heap
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
5AC9000
|
heap
|
page read and write
|
||
44A000
|
unkown
|
page readonly
|
||
6B410000
|
unkown
|
page readonly
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
6FF47000
|
unkown
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
2C4C000
|
heap
|
page read and write
|
||
45CD000
|
heap
|
page read and write
|
||
1CC5CF46000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2A85000
|
trusted library allocation
|
page read and write
|
||
2E39000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
15B9000
|
heap
|
page read and write
|
||
1E8894D8000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
5B1F000
|
heap
|
page read and write
|
||
102E2000
|
unkown
|
page readonly
|
||
2A9E000
|
stack
|
page read and write
|
||
5C4D000
|
heap
|
page read and write
|
||
30953FE000
|
stack
|
page read and write
|
||
217F9800000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
2B83000
|
heap
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
2E68000
|
heap
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1221000
|
unkown
|
page execute read
|
||
2BEA000
|
heap
|
page read and write
|
||
1E8894F8000
|
heap
|
page read and write
|
||
5A57000
|
heap
|
page read and write
|
||
358A000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page execute read
|
||
1E8894F5000
|
heap
|
page read and write
|
||
1E8894E7000
|
heap
|
page read and write
|
||
8D2000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
1E88B3F6000
|
trusted library allocation
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
700EF000
|
unkown
|
page readonly
|
||
3520000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
3AB9000
|
heap
|
page read and write
|
||
10367000
|
unkown
|
page readonly
|
||
EFD000
|
stack
|
page read and write
|
||
1CC5CF30000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
6AB91000
|
unkown
|
page execute read
|
||
6BA75000
|
unkown
|
page readonly
|
||
902000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
F6A000
|
unkown
|
page readonly
|
||
1E889551000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
1E8894F8000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
3263000
|
trusted library allocation
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
6BF01000
|
unkown
|
page execute read
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
81F000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
1E8894F6000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
464000
|
unkown
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
2A8B000
|
trusted library allocation
|
page read and write
|
||
2A8C000
|
trusted library allocation
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
6AC71000
|
unkown
|
page execute read
|
||
2D74000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
5B28000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
6976FF000
|
stack
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
326D000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
6975FF000
|
stack
|
page read and write
|
||
1E7F6E69000
|
heap
|
page read and write
|
||
5C4D000
|
heap
|
page read and write
|
||
2F8A000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page execute read
|
||
81A000
|
heap
|
page read and write
|
||
5C27000
|
heap
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
6B461000
|
unkown
|
page execute read
|
||
173E000
|
stack
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
518000
|
unkown
|
page readonly
|
||
869000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
5C16000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
6BB0E000
|
unkown
|
page write copy
|
||
1E88B40A000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
5AFC000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
6FF5D000
|
unkown
|
page readonly
|
||
822000
|
heap
|
page read and write
|
||
45E7000
|
heap
|
page read and write
|
||
5C48000
|
heap
|
page read and write
|
||
102D2000
|
unkown
|
page readonly
|
||
2AD8000
|
trusted library allocation
|
page read and write
|
||
394F000
|
heap
|
page read and write
|
||
7FF75D286000
|
unkown
|
page write copy
|
||
6ABF1000
|
unkown
|
page execute read
|
||
3B64000
|
heap
|
page read and write
|
||
6ACB5000
|
unkown
|
page readonly
|
||
6BF00000
|
unkown
|
page readonly
|
||
4643000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
2C9C000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
34BC000
|
heap
|
page read and write
|
||
6B6B1000
|
unkown
|
page execute read
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
2BC1000
|
heap
|
page read and write
|
||
464000
|
unkown
|
page write copy
|
||
2F89000
|
trusted library allocation
|
page read and write
|
||
15A6000
|
heap
|
page read and write
|
||
5C2F000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
822000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
23639D90000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
5BD4000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
15B1000
|
heap
|
page read and write
|
||
2AE3000
|
heap
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page execute read
|
||
1F787BE0000
|
heap
|
page read and write
|
||
157D000
|
heap
|
page read and write
|
||
1E88954D000
|
heap
|
page read and write
|
||
9BD000
|
heap
|
page read and write
|
||
1C1B4B45000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
3589000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
4AB000
|
stack
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
823000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
4D6000
|
unkown
|
page read and write
|
||
F4A000
|
unkown
|
page readonly
|
||
217F98F2000
|
heap
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
342C000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
BC5B8FE000
|
stack
|
page read and write
|
||
2A88000
|
trusted library allocation
|
page read and write
|
||
1976000
|
heap
|
page read and write
|
||
157D000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
508000
|
unkown
|
page readonly
|
||
2D15000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
6B191000
|
unkown
|
page execute read
|
||
2BA9000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
D61000
|
unkown
|
page readonly
|
||
5C1D000
|
heap
|
page read and write
|
||
1E88B3F9000
|
trusted library allocation
|
page read and write
|
||
404000
|
unkown
|
page write copy
|
||
5B31000
|
heap
|
page read and write
|
||
3442000
|
heap
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
2DBD000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
5C41000
|
heap
|
page read and write
|
||
628000
|
heap
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1CC5E7C0000
|
heap
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
3474000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
6ACAB000
|
unkown
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
456D000
|
heap
|
page read and write
|
||
6204000
|
trusted library allocation
|
page read and write
|
||
4667000
|
heap
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
6C7F3000
|
unkown
|
page write copy
|
||
5A49000
|
heap
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
1E88954F000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
6ACDC000
|
unkown
|
page readonly
|
||
3266000
|
trusted library allocation
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
6BEC3000
|
unkown
|
page write copy
|
||
7C0000
|
heap
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
2B83000
|
heap
|
page read and write
|
||
2F8B000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
1E7F6EA2000
|
heap
|
page read and write
|
||
1E88B409000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
2DB4000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
6C8CA000
|
unkown
|
page readonly
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
217F9906000
|
heap
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
19F69FE000
|
stack
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
893000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
1C1B3140000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
6C7F6000
|
unkown
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
5ADA000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1E8894F8000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
2CDB000
|
heap
|
page read and write
|
||
1E88B220000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
2DAC000
|
heap
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
158E000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
9AD000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
A3D000
|
stack
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
2CAA000
|
heap
|
page read and write
|
||
3920000
|
trusted library allocation
|
page read and write
|
||
6ADBD000
|
unkown
|
page readonly
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
1E8894F7000
|
heap
|
page read and write
|
||
CB1F0FF000
|
stack
|
page read and write
|
||
5C27000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
6203000
|
trusted library allocation
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
6B6B0000
|
unkown
|
page readonly
|
||
2B20000
|
heap
|
page read and write
|
||
6C61F000
|
unkown
|
page readonly
|
||
D2C000
|
unkown
|
page readonly
|
||
822000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
3917000
|
trusted library allocation
|
page read and write
|
||
1E88B3F1000
|
trusted library allocation
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
3691000
|
heap
|
page read and write
|
||
70040000
|
unkown
|
page readonly
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
1E88B3F5000
|
trusted library allocation
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6B22D000
|
unkown
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
391C000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
1E8894F8000
|
heap
|
page read and write
|
||
2BA9000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page read and write
|
||
217F9830000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
5BD4000
|
heap
|
page read and write
|
||
5CA2000
|
heap
|
page read and write
|
||
5B71000
|
heap
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
6B24E000
|
unkown
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
2BA9000
|
heap
|
page read and write
|
||
2C2E000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
5A50000
|
heap
|
page read and write
|
||
3D2B000
|
heap
|
page read and write
|
||
1E8894F6000
|
heap
|
page read and write
|
||
6C918000
|
unkown
|
page read and write
|
||
5ACF000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
2DDF000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
2BAD000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
6BCBC000
|
unkown
|
page execute read
|
||
5BDD000
|
heap
|
page read and write
|
||
52FA000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
1E88B0A0000
|
heap
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
7FF75D28A000
|
unkown
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
2DB4000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
6205000
|
trusted library allocation
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
2DA5000
|
heap
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
2D2F000
|
heap
|
page read and write
|
||
2C86000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
6ABE3000
|
unkown
|
page readonly
|
||
D26000
|
heap
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
6B405000
|
unkown
|
page readonly
|
||
5A7E000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
6AC00000
|
unkown
|
page readonly
|
||
2DFE000
|
stack
|
page read and write
|
||
2A82000
|
trusted library allocation
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
7FF75D286000
|
unkown
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
A87DF3E000
|
stack
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
5C3A000
|
heap
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
421B000
|
stack
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
6C350000
|
unkown
|
page readonly
|
||
6BECF000
|
unkown
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
1E889511000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
6C7F0000
|
unkown
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
2CE8000
|
heap
|
page read and write
|
||
9CD000
|
heap
|
page read and write
|
||
2CC5000
|
stack
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
3E90000
|
heap
|
page read and write
|
||
5C41000
|
heap
|
page read and write
|
||
1206000
|
unkown
|
page write copy
|
||
800000
|
heap
|
page read and write
|
||
6C8E0000
|
unkown
|
page readonly
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
839000
|
stack
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
7FF75D286000
|
unkown
|
page write copy
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
5A92000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5C3A000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
1F7861A1000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
1E889513000
|
heap
|
page read and write
|
||
5BE4000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
1203000
|
unkown
|
page write copy
|
||
823000
|
heap
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
5A31000
|
heap
|
page read and write
|
||
52FF000
|
heap
|
page read and write
|
||
3919000
|
trusted library allocation
|
page read and write
|
||
6C8F6000
|
unkown
|
page execute read
|
||
1E889551000
|
heap
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
2B75000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
5C41000
|
heap
|
page read and write
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
1E88B3FA000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
unkown
|
page readonly
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
EFC000
|
heap
|
page read and write
|
||
2DAD000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
2D1C000
|
heap
|
page read and write
|
||
F4A000
|
unkown
|
page readonly
|
||
1E889511000
|
heap
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
5A92000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
3486000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
5FD000
|
stack
|
page read and write
|
||
F3C000
|
heap
|
page read and write
|
||
15BD000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
940000
|
heap
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
6B460000
|
unkown
|
page readonly
|
||
1E889551000
|
heap
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
4DB000
|
unkown
|
page readonly
|
||
7FF75D277000
|
unkown
|
page readonly
|
||
6C8C0000
|
unkown
|
page readonly
|
||
5C0D000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
460B000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
518000
|
unkown
|
page readonly
|
||
E30000
|
heap
|
page read and write
|
||
21C0000
|
unkown
|
page read and write
|
||
3B5A000
|
stack
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
4664000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
535D000
|
heap
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
700EC000
|
unkown
|
page read and write
|
||
52ED000
|
stack
|
page read and write
|
||
6B3E0000
|
unkown
|
page readonly
|
||
2DDE000
|
heap
|
page read and write
|
||
4566000
|
heap
|
page read and write
|
||
6CFF000
|
stack
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
5A4A000
|
heap
|
page read and write
|
||
6BECD000
|
unkown
|
page write copy
|
||
6FF50000
|
unkown
|
page readonly
|
||
11F1000
|
unkown
|
page execute read
|
||
972000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
700E5000
|
unkown
|
page readonly
|
||
1E889644000
|
trusted library allocation
|
page read and write
|
||
5C3F000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
1E8894A0000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
6BCD2000
|
unkown
|
page read and write
|
||
1C1B4CC0000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
45E4000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
6FF51000
|
unkown
|
page execute read
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
464000
|
unkown
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
5B31000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
1E8894C0000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
15D2000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
460E000
|
heap
|
page read and write
|
||
5C27000
|
heap
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
6BB49000
|
unkown
|
page read and write
|
||
6AD5D000
|
unkown
|
page readonly
|
||
1E88B400000
|
trusted library allocation
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
6AC01000
|
unkown
|
page execute read
|
||
6C8C1000
|
unkown
|
page execute read
|
||
996000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
2E61000
|
heap
|
page read and write
|
||
7FF75D261000
|
unkown
|
page execute read
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
DE3000
|
unkown
|
page readonly
|
||
3912000
|
trusted library allocation
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
1E889551000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
1E889505000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
5A57000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
1E88B3FF000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
5C41000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
7FF75D286000
|
unkown
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
155C000
|
heap
|
page read and write
|
||
A87E2FE000
|
stack
|
page read and write
|
||
1E8894F7000
|
heap
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
45BA000
|
heap
|
page read and write
|
||
1E889513000
|
heap
|
page read and write
|
||
1E88B403000
|
trusted library allocation
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
1220000
|
unkown
|
page readonly
|
||
929000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
BC5B2F9000
|
stack
|
page read and write
|
||
1E88B3FC000
|
trusted library allocation
|
page read and write
|
||
CB1F2FE000
|
stack
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
392D000
|
heap
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
80C000
|
heap
|
page read and write
|
||
23638336000
|
heap
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
5EE0000
|
heap
|
page read and write
|
||
2E6C000
|
heap
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
2D15000
|
heap
|
page read and write
|
||
6ABCC000
|
unkown
|
page readonly
|
||
102DC000
|
unkown
|
page readonly
|
||
835000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
156B000
|
heap
|
page read and write
|
||
3489000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
9BF000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page readonly
|
||
45D2000
|
heap
|
page read and write
|
||
4D6000
|
unkown
|
page write copy
|
||
2C80000
|
heap
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
7FF75D286000
|
unkown
|
page read and write
|
||
1E7F6E85000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
2CFB000
|
heap
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
5A7C000
|
heap
|
page read and write
|
||
5C46000
|
heap
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
7FF75D260000
|
unkown
|
page readonly
|
||
2E58000
|
heap
|
page read and write
|
||
1E7F6E8E000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
358A000
|
heap
|
page read and write
|
||
3B60000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
5C2F000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
157D000
|
heap
|
page read and write
|
||
2C16000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
5C2F000
|
heap
|
page read and write
|
||
1E7F6E90000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
5BA6000
|
heap
|
page read and write
|
||
1E88B402000
|
trusted library allocation
|
page read and write
|
||
102E7000
|
unkown
|
page readonly
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
6C911000
|
unkown
|
page execute read
|
||
391F000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
heap
|
page read and write
|
||
1E88B3FD000
|
trusted library allocation
|
page read and write
|
||
2AD7000
|
trusted library allocation
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
9F1000
|
heap
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
5C2F000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
1E88B40C000
|
trusted library allocation
|
page read and write
|
||
157F000
|
heap
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
heap
|
page read and write
|
||
217F98F2000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
697AFE000
|
stack
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
3AF7000
|
heap
|
page read and write
|
||
2DCF000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
6FF41000
|
unkown
|
page execute read
|
||
3265000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
5A42000
|
heap
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
1CC5CF46000
|
heap
|
page read and write
|
||
2ADE000
|
trusted library allocation
|
page read and write
|
||
6BECC000
|
unkown
|
page read and write
|
||
1E88B406000
|
trusted library allocation
|
page read and write
|
||
2DB4000
|
heap
|
page read and write
|
||
1E889562000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
5B7E000
|
heap
|
page read and write
|
||
1E88953F000
|
heap
|
page read and write
|
||
F47000
|
heap
|
page read and write
|
||
7FF75D28B000
|
unkown
|
page readonly
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
5B15000
|
heap
|
page read and write
|
||
1E88B401000
|
trusted library allocation
|
page read and write
|
||
6AE77000
|
unkown
|
page readonly
|
||
45E1000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
5C27000
|
heap
|
page read and write
|
||
3889000
|
heap
|
page read and write
|
||
14BD000
|
stack
|
page read and write
|
||
1E88B3FE000
|
trusted library allocation
|
page read and write
|
||
2CA5000
|
heap
|
page read and write
|
||
1E889640000
|
trusted library allocation
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
1E88B404000
|
trusted library allocation
|
page read and write
|
||
1E88B405000
|
trusted library allocation
|
page read and write
|
||
1E88B3FB000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
10310000
|
unkown
|
page write copy
|
||
2D36000
|
heap
|
page read and write
|
There are 2677 hidden memdumps, click here to show them.