IOC Report
SPCapIQProOffice-1.0.24095.1.exe

loading gif

Files

File Path
Type
Category
Malicious
SPCapIQProOffice-1.0.24095.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\9e8b505ac5bf67d26cfba004c7a3fd\vstor40_x64.cab
Microsoft Cabinet archive data, many, 2098198 bytes, 84 files, at 0xdc +A "ActionsPane3.xsd_x86.3643236F_FC70_11D3_A536_0090278A1BB8" +A "AppInfoDocAddInsStoreFile", 20 cffolders, flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1503 compression
dropped
malicious
C:\ProgramData\Package Cache\.unverified\SPCapIQProOffice_x86_1.0.24095.1.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Office, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {A34B3796-9442-4328-875C-4043632CEC59}, Create Time/Date: Thu Apr 4 17:14:30 2024, Last Saved Time/Date: Thu Apr 4 17:14:30 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
malicious
C:\ProgramData\Package Cache\.unverified\VSTOR (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\56704865939C2388913D05724632D7B3B67D3CD9\vstor_redist.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\{8ABF444C-2498-4B37-A960-91BFE1481ED5}v1.0.24095.1\SPCapIQProOffice-x86-1.0.24095.1.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Office, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {A34B3796-9442-4328-875C-4043632CEC59}, Create Time/Date: Thu Apr 4 17:14:30 2024, Last Saved Time/Date: Thu Apr 4 17:14:30 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
malicious
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\SPCapIQProOffice_x86_1.0.24095.1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Office, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {A34B3796-9442-4328-875C-4043632CEC59}, Create Time/Date: Thu Apr 4 17:14:30 2024, Last Saved Time/Date: Thu Apr 4 17:14:30 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
malicious
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.be\SPCapIQProOffice-1.0.24095.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\SPCapIQProOffice_x86_1.0.24095.1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Office, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {A34B3796-9442-4328-875C-4043632CEC59}, Create Time/Date: Thu Apr 4 17:14:30 2024, Last Saved Time/Date: Thu Apr 4 17:14:30 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
malicious
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\VSTOR
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{73829BDB-07F0-4DD2-B2DF-FEE38C08D320}\.cr\SPCapIQProOffice-1.0.24095.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\e4b15374fbeb09b00c2ff6ea22\Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
44aae5.rbf (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
44ab1a.rbf (copy)
ASCII text, with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\$shtdwn$.req
data
dropped
C:\5dbc7bbf14917454e3442522d4a6\1025\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1025\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1025\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1028\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1028\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1028\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1030\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1030\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1030\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1031\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1031\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1031\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1033\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (581), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1033\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1033\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1035\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1035\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1035\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1036\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1036\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1036\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1037\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1037\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1037\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1040\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1040\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1040\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1041\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1041\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1041\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1042\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1042\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1042\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1043\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1043\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1043\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1044\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1044\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1044\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1045\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1045\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1045\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1046\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1046\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1046\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1049\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1049\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1049\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\1053\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\1053\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\1053\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\2052\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\2052\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\2052\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\3082\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\3082\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\3082\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\5dbc7bbf14917454e3442522d4a6\DHtmlHeader.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\DisplayIcon.ico
MS Windows icon resource - 13 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Print.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate1.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate2.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate3.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate4.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate5.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate6.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate7.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Rotate8.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Save.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\Setup.ico
MS Windows icon resource - 12 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\SysReqMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\SysReqNotMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\stop.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\Graphics\warn.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\5dbc7bbf14917454e3442522d4a6\ParameterInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\SetupEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\SetupUi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\SetupUi.xsd
XML 1.0 document, ASCII text, with very long lines (335), with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\SplashScreen.bmp
PC bitmap, Windows 3.x format, 200 x 200 x 8, image size 40000, resolution 3779 x 3779 px/m, cbSize 41078, bits offset 1078
dropped
C:\5dbc7bbf14917454e3442522d4a6\Strings.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\UiInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\5dbc7bbf14917454e3442522d4a6\VC_Red_x64\msp_kb2565063.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:00:42 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: x64;0, Last Saved By: x64;0, Revision Number: {1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{5B75F761-BAC8-33BC-A381-464DDDD813A3}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\5dbc7bbf14917454e3442522d4a6\VC_Red_x64\vc_red.cab
Microsoft Cabinet archive data, 4872031 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x64" +A "F_CENTRAL_mfc100_x64", flags 0x4, number 1, extra bytes 20 in head, 444 datablocks, 0x1503 compression
dropped
C:\5dbc7bbf14917454e3442522d4a6\VC_Red_x64\vc_red.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\5dbc7bbf14917454e3442522d4a6\VC_Red_x86\msp_kb2565063.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:19:52 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: Intel;0, Last Saved By: Intel;0, Revision Number: {F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{1F4F1D2A-D9DA-32CF-9909-48485DA06DD5}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\5dbc7bbf14917454e3442522d4a6\VC_Red_x86\vc_red.cab
Microsoft Cabinet archive data, 4218761 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x86" +A "F_CENTRAL_mfc100_x86", flags 0x4, number 1, extra bytes 20 in head, 357 datablocks, 0x1503 compression
dropped
C:\5dbc7bbf14917454e3442522d4a6\VC_Red_x86\vc_red.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\5dbc7bbf14917454e3442522d4a6\header.bmp
PC bitmap, Windows 3.x format, 49 x 49 x 24, image size 7254, resolution 2834 x 2834 px/m, cbSize 7308, bits offset 54
dropped
C:\5dbc7bbf14917454e3442522d4a6\sqmapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_ara.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_chs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_cht.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_dan.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_deu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_esn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_fin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_fra.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_heb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_ita.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_jpn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_kor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_nld.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_nor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_plk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_ptb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_rus.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x64_sve.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_ara.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_chs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_cht.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_dan.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_deu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_esn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_fin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_fra.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_heb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_ita.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_jpn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_kor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_nld.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_nor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_plk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_ptb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_rus.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\vstor40\vstor40_LP_x86_sve.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\5dbc7bbf14917454e3442522d4a6\watermark.bmp
PC bitmap, Windows 3.x format, 164 x 628 x 24, image size 308978, resolution 2834 x 2834 px/m, cbSize 309032, bits offset 54
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1025.txt
Unicode text, UTF-16, little-endian text, with very long lines (456), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1028.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1030.txt
Unicode text, UTF-16, little-endian text, with very long lines (555), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1031.txt
Unicode text, UTF-16, little-endian text, with very long lines (660), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1033.txt
Unicode text, UTF-16, little-endian text, with very long lines (432), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1035.txt
Unicode text, UTF-16, little-endian text, with very long lines (549), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1036.txt
Unicode text, UTF-16, little-endian text, with very long lines (552), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1037.txt
Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1040.txt
Unicode text, UTF-16, little-endian text, with very long lines (594), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1041.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1042.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1043.txt
Unicode text, UTF-16, little-endian text, with very long lines (529), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1044.txt
Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1045.txt
Unicode text, UTF-16, little-endian text, with very long lines (573), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1046.txt
Unicode text, UTF-16, little-endian text, with very long lines (493), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1049.txt
Unicode text, UTF-16, little-endian text, with very long lines (706), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.1053.txt
Unicode text, UTF-16, little-endian text, with very long lines (499), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.2052.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\eula.3082.txt
Unicode text, UTF-16, little-endian text, with very long lines (573), with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\globdata.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1025.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1028.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1030.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1031.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1033.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1035.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1036.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1037.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1040.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1041.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1042.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1043.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1044.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1045.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1046.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1049.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.1053.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
modified
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.2052.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.res.3082.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\9e8b505ac5bf67d26cfba004c7a3fd\vstor40_x64.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual Studio 2010 Tools for Office Runtime (x64), Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual Studio 2010 Tools for Office Runtime (x64)., Template: x64;0, Revision Number: {011224A3-6FF2-4548-95B2-8E1F0DCB33F9}, Create Time/Date: Thu Aug 25 05:31:08 2016, Last Saved Time/Date: Thu Aug 25 05:31:08 2016, Number of Pages: 300, Name of Creating Application: Windows Installer XML (3.5.0626.0), Security: 2, Number of Words: 2
dropped
C:\Config.Msi\44aade.rbs
data
dropped
C:\Config.Msi\44aae4.rbs
data
dropped
C:\Config.Msi\44aaea.rbs
data
dropped
C:\Config.Msi\44aaeb.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaec.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaed.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaee.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaef.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf0.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf1.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf2.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf3.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf4.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf5.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf6.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf7.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf8.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaf9.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aafa.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aafb.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aafc.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aafd.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aafe.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44aaff.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab00.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab01.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab02.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab03.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab04.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab05.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab06.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab07.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab08.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab09.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab0a.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab0b.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab0c.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab0d.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab0e.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab0f.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab10.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab11.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab12.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab13.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab14.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab15.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab16.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab17.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab18.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\44ab19.rbf
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\AddIns.store
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOInstallerUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOLoaderUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1025.txt
Unicode text, UTF-16, little-endian text, with very long lines (456), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1028.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1030.txt
Unicode text, UTF-16, little-endian text, with very long lines (555), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1031.txt
Unicode text, UTF-16, little-endian text, with very long lines (660), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1033.txt
Unicode text, UTF-16, little-endian text, with very long lines (432), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1035.txt
Unicode text, UTF-16, little-endian text, with very long lines (549), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1036.txt
Unicode text, UTF-16, little-endian text, with very long lines (552), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1037.txt
Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1040.txt
Unicode text, UTF-16, little-endian text, with very long lines (594), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1041.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1042.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1043.txt
Unicode text, UTF-16, little-endian text, with very long lines (529), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1044.txt
Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1045.txt
Unicode text, UTF-16, little-endian text, with very long lines (573), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1046.txt
Unicode text, UTF-16, little-endian text, with very long lines (493), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1049.txt
Unicode text, UTF-16, little-endian text, with very long lines (706), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.1053.txt
Unicode text, UTF-16, little-endian text, with very long lines (499), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.2052.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\eula.3082.txt
Unicode text, UTF-16, little-endian text, with very long lines (573), with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\globdata.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1025.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1028.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1030.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1031.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1033.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1035.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1036.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1037.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1040.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1041.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1042.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1043.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1044.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1045.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1046.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1049.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1053.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.2052.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.3082.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\vstor40_x64.MSI
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual Studio 2010 Tools for Office Runtime (x64), Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual Studio 2010 Tools for Office Runtime (x64)., Template: x64;0, Revision Number: {011224A3-6FF2-4548-95B2-8E1F0DCB33F9}, Create Time/Date: Thu Aug 25 05:31:08 2016, Last Saved Time/Date: Thu Aug 25 05:31:08 2016, Number of Pages: 300, Name of Creating Application: Windows Installer XML (3.5.0626.0), Security: 2, Number of Words: 2
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\vstor40_x64.cab
Microsoft Cabinet archive data, many, 2098198 bytes, 84 files, at 0xdc +A "ActionsPane3.xsd_x86.3643236F_FC70_11D3_A536_0090278A1BB8" +A "AppInfoDocAddInsStoreFile", 20 cffolders, flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1503 compression
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\vstoee.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\vstoee100.tlb
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Common Files\microsoft shared\VSTO\vstoee90.tlb
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\ProgramData\Package Cache\.unverified\PluginManager_1.0.24095.1.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Plugin Manager, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {F16935F8-F23A-4720-BD54-71BE8DB064DA}, Create Time/Date: Thu Apr 4 17:08:44 2024, Last Saved Time/Date: Thu Apr 4 17:08:44 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{6CC39F5D-6ED2-439D-A256-2B11D25C5B16}v1.0.24095.1\PluginManager-1.0.24095.1.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Plugin Manager, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {F16935F8-F23A-4720-BD54-71BE8DB064DA}, Create Time/Date: Thu Apr 4 17:08:44 2024, Last Saved Time/Date: Thu Apr 4 17:08:44 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\DEL80A9.tmp (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\HFI861E.tmp.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\HFIA3F9.tmp.html
data
dropped
C:\Users\user\AppData\Local\Temp\HFIF591.tmp.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MSI58d3c.LOG
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\Microsoft Visual Studio Tools for Office Runtime 2010 Setup_20240419_025312968-MSI_vc_red.msi.txt
Unicode text, UTF-16, little-endian text, with very long lines (315), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Microsoft Visual Studio Tools for Office Runtime 2010 Setup_20240419_025312968.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (346), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Microsoft Visual Studio Tools for Office Runtime 2010 Setup_20240419_025343865.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (329), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\S&P_Capital_IQ_Pro_Office_20240419025210.log
ASCII text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\S&P_Capital_IQ_Pro_Office_20240419025210_001_SPCapIQProOffice_x86_1.0.24095.1.msi.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Setup_20240419_025305483.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (329), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Setup_20240419_025334037.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (329), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\VWL2144.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vstor40_x64MSI067D.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vstor40_x64UI067D.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\10250\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\1028\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\1031\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (371), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\1033\thm.wxl
XML 1.0 document, ASCII text, with very long lines (354), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\1041\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\1041\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\1046\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (354), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\11274\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\12298\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\13322\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\14346\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\15370\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\16394\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\17418\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\18442\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\19466\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\20490\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\2052\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\2058\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\3076\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\4106\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\5130\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\6154\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\7178\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\8202\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\9226\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (1032), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\bafunctions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\logo.png
PNG image data, 400 x 70, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\.ba\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\PluginManager_1.0.24095.1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Plugin Manager, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {F16935F8-F23A-4720-BD54-71BE8DB064DA}, Create Time/Date: Thu Apr 4 17:08:44 2024, Last Saved Time/Date: Thu Apr 4 17:08:44 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\PluginManager_1.0.24095.1.msi.R
data
dropped
C:\Users\user\AppData\Local\Temp\{A5DF5AFE-B192-4687-96B1-CE307FC167B5}\SPCapIQProOffice_x86_1.0.24095.1.msi.R
data
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_atl100_x64
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100chs_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100cht_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100deu_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100enu_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100esn_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100fra_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100ita_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100jpn_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100kor_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100rus_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100u_x64
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfcm100_x64
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfcm100u_x64
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_msvcp100_x64
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_msvcr100_x64
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_vcomp100_x64
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\CacheSize.txt
ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_atl100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100chs_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100cht_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100deu_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100enu_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100esn_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100fra_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100ita_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100jpn_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100kor_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100rus_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100u_x86
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfcm100_x86
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfcm100u_x86
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcp100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcr100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_vcomp100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAAddInAdapter_GAC_v10_enu_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAAddInAdapter_Pipeline_v10_enu_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAHosting_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTARuntime_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAServerDocument_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOCommonImpl_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOCommonInterfaces_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOContainerControl_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOCoreInterfaces_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOExcelHostAdapter_GAC_v10_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOExcelImpl_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOExcelInterfaces_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOOutlookHostAdapter_GAC_v10_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOOutlookImpl_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOOutlookInterfaces_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTORuntime_GAC_amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTORuntime_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTORuntime_GAC_nomaf_runtime_internal_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOV4Framework_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOWordHostAdapter_GAC_v10_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOWordImpl_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOWordInterfaces_GAC_nomaf_runtime_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Applications.Contract.v10_GAC_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Applications.Contract.v10_Pipeline_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10_GAC_amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll_GAC_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll_Pipeline_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft_VisualStudio_Tools_Applications_Hosting_v10_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_VSTOInstallerUI_enu_x86.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_VSTOLoaderUI_dll_x86_ln.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_VSTOMessageProvider_x86.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\MSVSTOContainerControl_GAC_v10_amd64
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.Office.Tools.Excel.Adapter_Pipeline.v10.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.Office.Tools.Outlook.Adapter_Pipeline.v10.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.Office.Tools.Word.Adapter_Pipeline.v10.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10_GAC.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10_Pipeline.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Applications.Runtime.v10_GAC.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Applications.Runtime.v10_Pipeline.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Office.AddInHostAdapter.v10_GAC.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Office.AddInHostAdapter.v10_Pipeline.amd64.enu
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\VSTOInstaller_exe_x86.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\VSTOLoader_dll_x86.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\vsto_shared_typelib100_x86.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\vsto_shared_typelib90_x86.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\vsto_shared_vstoee_x86.3643236F_FC70_11D3_A536_0090278A1BB8
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\44aadb.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\44aadc.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:19:52 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: Intel;0, Last Saved By: Intel;0, Revision Number: {F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{1F4F1D2A-D9DA-32CF-9909-48485DA06DD5}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\Windows\Installer\44aadf.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\44aae0.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:19:52 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: Intel;0, Last Saved By: Intel;0, Revision Number: {F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{1F4F1D2A-D9DA-32CF-9909-48485DA06DD5}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\Windows\Installer\44aae1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\44aae2.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:00:42 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: x64;0, Last Saved By: x64;0, Revision Number: {1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{5B75F761-BAC8-33BC-A381-464DDDD813A3}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\Windows\Installer\44aae6.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\44aae7.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:00:42 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: x64;0, Last Saved By: x64;0, Revision Number: {1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{5B75F761-BAC8-33BC-A381-464DDDD813A3}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\Windows\Installer\44aae8.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual Studio 2010 Tools for Office Runtime (x64), Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual Studio 2010 Tools for Office Runtime (x64)., Template: x64;0, Revision Number: {011224A3-6FF2-4548-95B2-8E1F0DCB33F9}, Create Time/Date: Thu Aug 25 05:31:08 2016, Last Saved Time/Date: Thu Aug 25 05:31:08 2016, Number of Pages: 300, Name of Creating Application: Windows Installer XML (3.5.0626.0), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\44ab1b.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual Studio 2010 Tools for Office Runtime (x64), Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual Studio 2010 Tools for Office Runtime (x64)., Template: x64;0, Revision Number: {011224A3-6FF2-4548-95B2-8E1F0DCB33F9}, Create Time/Date: Thu Aug 25 05:31:08 2016, Last Saved Time/Date: Thu Aug 25 05:31:08 2016, Number of Pages: 300, Name of Creating Application: Windows Installer XML (3.5.0626.0), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\44ab1c.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Office, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {A34B3796-9442-4328-875C-4043632CEC59}, Create Time/Date: Thu Apr 4 17:14:30 2024, Last Saved Time/Date: Thu Apr 4 17:14:30 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Windows\Installer\MSI1A47.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI1A96.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI1E21.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI38AF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI390E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI39AB.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI3A29.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI3B24.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI593.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI6DC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI74A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI81F2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
C:\Windows\Installer\MSIAF02.tmp
data
dropped
C:\Windows\Installer\MSIC8E4.tmp
data
dropped
C:\Windows\Installer\MSIE6FC.tmp
data
dropped
C:\Windows\Installer\MSIE789.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIEC1E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{FD9D64F4-CAF5-3D23-845A-B843C78CC1A5}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
modified
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
modified
C:\Windows\SysWOW64\atl100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100chs.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100cht.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100deu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100enu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100esn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100fra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100ita.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100jpn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100kor.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100rus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100u.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm100.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm100u.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\System32\atl100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100chs.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100cht.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100deu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100enu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100esn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100fra.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100ita.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100jpn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100kor.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100rus.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfcm100.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\System32\mfcm100u.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\System32\msvcp100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\msvcr100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\vcomp100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\10250\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\1028\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\1031\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (371), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\1033\thm.wxl
XML 1.0 document, ASCII text, with very long lines (354), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\1041\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\1041\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\1046\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (354), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\11274\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\12298\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\13322\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\14346\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\15370\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\16394\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\17418\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\18442\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\19466\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\20490\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\2052\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\2058\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\3076\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\4106\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\5130\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\6154\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\7178\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\8202\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\9226\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (1032), with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\bafunctions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\logo.png
PNG image data, 400 x 70, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.ba\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\PluginManager_1.0.24095.1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: S&P Capital IQ Pro Plugin Manager, Author: S&P Global Market Intelligence, Keywords: Installer, Comments: S&P Capital IQ Pro Office, Template: Intel;1033, Revision Number: {F16935F8-F23A-4720-BD54-71BE8DB064DA}, Create Time/Date: Thu Apr 4 17:08:44 2024, Last Saved Time/Date: Thu Apr 4 17:08:44 2024, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\PluginManager_1.0.24095.1.msi.R
data
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\SPCapIQProOffice_x86_1.0.24095.1.msi.R
data
dropped
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\VSTOR.R
data
dropped
C:\Windows\Temp\~DF0623151DB98B1A65.TMP
data
dropped
C:\Windows\Temp\~DF0971AD742B5990DD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF0FBC9CBEA2ED8E26.TMP
data
dropped
C:\Windows\Temp\~DF18C68E064AA4DFA2.TMP
data
dropped
C:\Windows\Temp\~DF229B3A3A600BE541.TMP
data
dropped
C:\Windows\Temp\~DF2948B0F8F59BE33A.TMP
data
dropped
C:\Windows\Temp\~DF33FB9A75E62CDE51.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3FD553643267037B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4C0AEF06C3C95FB4.TMP
data
dropped
C:\Windows\Temp\~DF4E00D53B4D435B52.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF53CFB11792DCCD7B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF54EE70578BB0F5E1.TMP
data
dropped
C:\Windows\Temp\~DF58530437BDA3CB1B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5DCFA47617C94D5D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5FC1209E94469369.TMP
data
dropped
C:\Windows\Temp\~DF62F0FEA124282B2E.TMP
data
dropped
C:\Windows\Temp\~DF64444C3E394AEB5B.TMP
data
dropped
C:\Windows\Temp\~DF6B3A187B8896C78F.TMP
data
dropped
C:\Windows\Temp\~DF72EF7D725A7071C4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF839967FFD6304E46.TMP
data
dropped
C:\Windows\Temp\~DF8CA69835740B91E7.TMP
data
dropped
C:\Windows\Temp\~DF9088AA951A1F1D81.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF944C457B91834880.TMP
data
dropped
C:\Windows\Temp\~DF95F18BE92C9FA377.TMP
data
dropped
C:\Windows\Temp\~DFA0B4F0BCCDFA2C12.TMP
data
dropped
C:\Windows\Temp\~DFA714FD0336E25172.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB162877D77ED7A05.TMP
data
dropped
C:\Windows\Temp\~DFB19FD402007CBBEA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB218032686E3CC5C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB76FA6DAE3ECFEFA.TMP
data
dropped
C:\Windows\Temp\~DFB97888A48B870D8D.TMP
data
dropped
C:\Windows\Temp\~DFBB6775C9763654F8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFBC8D23065A958169.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC4BC6648ECAB471C.TMP
data
dropped
C:\Windows\Temp\~DFCE85393C60B4D744.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD072106F1F039B0C.TMP
data
dropped
C:\Windows\Temp\~DFFD6107702F81EED2.TMP
data
dropped
C:\e4b15374fbeb09b00c2ff6ea22\$shtdwn$.req
data
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1025\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1025\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1025\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1028\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1028\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1028\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1030\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1030\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1030\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1031\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1031\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1031\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1033\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (581), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1033\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1033\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1035\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1035\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1035\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1036\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1036\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1036\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1037\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1037\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1037\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1040\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1040\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1040\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1041\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1041\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1041\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1042\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1042\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1042\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1043\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1043\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1043\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1044\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1044\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1044\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1045\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1045\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1045\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1046\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1046\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1046\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1049\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1049\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1049\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1053\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1053\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\1053\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\2052\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\2052\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\2052\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\3082\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (580), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\3082\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\3082\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\e4b15374fbeb09b00c2ff6ea22\DHtmlHeader.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\DisplayIcon.ico
MS Windows icon resource - 13 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Print.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate1.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate2.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate3.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate4.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate5.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate6.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate7.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Rotate8.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Save.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\Setup.ico
MS Windows icon resource - 12 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\SysReqMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\SysReqNotMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\stop.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Graphics\warn.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\e4b15374fbeb09b00c2ff6ea22\ParameterInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\SetupEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\SetupUi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\SetupUi.xsd
XML 1.0 document, ASCII text, with very long lines (335), with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\SplashScreen.bmp
PC bitmap, Windows 3.x format, 200 x 200 x 8, image size 40000, resolution 3779 x 3779 px/m, cbSize 41078, bits offset 1078
dropped
C:\e4b15374fbeb09b00c2ff6ea22\Strings.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\UiInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\e4b15374fbeb09b00c2ff6ea22\VC_Red_x64\msp_kb2565063.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:00:42 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: x64;0, Last Saved By: x64;0, Revision Number: {1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{1D8E6291-B0D5-35EC-8441-6616F567A0F7}10.0.40219;{5B75F761-BAC8-33BC-A381-464DDDD813A3}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\e4b15374fbeb09b00c2ff6ea22\VC_Red_x64\vc_red.cab
Microsoft Cabinet archive data, 4872031 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x64" +A "F_CENTRAL_mfc100_x64", flags 0x4, number 1, extra bytes 20 in head, 444 datablocks, 0x1503 compression
dropped
C:\e4b15374fbeb09b00c2ff6ea22\VC_Red_x64\vc_red.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\e4b15374fbeb09b00c2ff6ea22\VC_Red_x86\msp_kb2565063.msp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Create Time/Date: Wed Jun 29 03:19:52 2011, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 4, Template: Intel;0, Last Saved By: Intel;0, Revision Number: {F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}10.0.40219;{1F4F1D2A-D9DA-32CF-9909-48485DA06DD5}, Number of Pages: 200, Number of Characters: 153223199
dropped
C:\e4b15374fbeb09b00c2ff6ea22\VC_Red_x86\vc_red.cab
Microsoft Cabinet archive data, 4218761 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x86" +A "F_CENTRAL_mfc100_x86", flags 0x4, number 1, extra bytes 20 in head, 357 datablocks, 0x1503 compression
dropped
C:\e4b15374fbeb09b00c2ff6ea22\VC_Red_x86\vc_red.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\e4b15374fbeb09b00c2ff6ea22\header.bmp
PC bitmap, Windows 3.x format, 49 x 49 x 24, image size 7254, resolution 2834 x 2834 px/m, cbSize 7308, bits offset 54
dropped
C:\e4b15374fbeb09b00c2ff6ea22\sqmapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_ara.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_chs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_cht.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_dan.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_deu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_esn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_fin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_fra.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_heb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_ita.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_jpn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_kor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_nld.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_nor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_plk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_ptb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_rus.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x64_sve.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_ara.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_chs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_cht.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_dan.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_deu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_esn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_fin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_fra.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_heb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_ita.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_jpn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_kor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_nld.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_nor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_plk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_ptb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_rus.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_LP_x86_sve.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\e4b15374fbeb09b00c2ff6ea22\watermark.bmp
PC bitmap, Windows 3.x format, 164 x 628 x 24, image size 308978, resolution 2834 x 2834 px/m, cbSize 309032, bits offset 54
dropped
There are 687 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\Temp\{73829BDB-07F0-4DD2-B2DF-FEE38C08D320}\.cr\SPCapIQProOffice-1.0.24095.1.exe
"C:\Windows\Temp\{73829BDB-07F0-4DD2-B2DF-FEE38C08D320}\.cr\SPCapIQProOffice-1.0.24095.1.exe" -burn.clean.room="C:\Users\user\Desktop\SPCapIQProOffice-1.0.24095.1.exe" -burn.filehandle.attached=532 -burn.filehandle.self=528
malicious
C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.be\SPCapIQProOffice-1.0.24095.1.exe
"C:\Windows\Temp\{2575F37D-4D59-4ADE-9B35-833ABC76F3A4}\.be\SPCapIQProOffice-1.0.24095.1.exe" -q -burn.elevated BurnPipe.{22255B69-8FB0-4B58-9A37-96EAAA229CC0} {B6A53FD5-A31E-4AF8-BB77-CA62C452506E} 7336
malicious
C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe
"C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe" /burn.runonce
malicious
C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe
"C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe" /burn.log.append "C:\Users\user\AppData\Local\Temp\S&P_Capital_IQ_Pro_Office_20240419025210.log"
malicious
C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe
"C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe" -burn.clean.room="C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe" -burn.filehandle.attached=520 -burn.filehandle.self=540 /burn.log.append "C:\Users\user\AppData\Local\Temp\S&P_Capital_IQ_Pro_Office_20240419025210.log"
malicious
C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe
"C:\ProgramData\Package Cache\{56aa9754-57aa-4a26-a164-12075d94eb2e}\SPCapIQProOffice-1.0.24095.1.exe" -q -burn.elevated BurnPipe.{F8907890-6A84-4345-B5A9-D02185C4BBD7} {C0D578AC-8A16-4B2B-B0EB-8A9283D46FE9} 7396
malicious
C:\ProgramData\Package Cache\56704865939C2388913D05724632D7B3B67D3CD9\vstor_redist.exe
"C:\ProgramData\Package Cache\56704865939C2388913D05724632D7B3B67D3CD9\vstor_redist.exe" /i /q /norestart
malicious
C:\e4b15374fbeb09b00c2ff6ea22\Setup.exe
c:\e4b15374fbeb09b00c2ff6ea22\Setup.exe /i /q /norestart
malicious
C:\e4b15374fbeb09b00c2ff6ea22\vstor40\vstor40_x64.exe
vstor40_x64.exe /q
malicious
C:\ProgramData\Package Cache\56704865939C2388913D05724632D7B3B67D3CD9\vstor_redist.exe
"C:\ProgramData\Package Cache\56704865939C2388913D05724632D7B3B67D3CD9\vstor_redist.exe" /i /q /norestart
malicious
C:\Users\user\Desktop\SPCapIQProOffice-1.0.24095.1.exe
"C:\Users\user\Desktop\SPCapIQProOffice-1.0.24095.1.exe"
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\9e8b505ac5bf67d26cfba004c7a3fd\install.exe
c:\9e8b505ac5bf67d26cfba004c7a3fd\install.exe /q
C:\Windows\SysWOW64\msiexec.exe
c:\Windows\syswow64\MsiExec.exe -Embedding 50D0C51C5F29CB2F939D1D66AF46B8FD
C:\Windows\System32\msiexec.exe
c:\Windows\System32\MsiExec.exe -Embedding 392B92B2C8922C55BB291E3DD13F1718
C:\5dbc7bbf14917454e3442522d4a6\Setup.exe
c:\5dbc7bbf14917454e3442522d4a6\Setup.exe /i /q /norestart
C:\Windows\SysWOW64\msiexec.exe
c:\Windows\syswow64\MsiExec.exe -Embedding 8B188487738B9071562D9EF7776E0846 M Global\MSI0000
C:\Windows\System32\msiexec.exe
c:\Windows\System32\MsiExec.exe -Embedding 65B24CE328994E1BC77923B19C5082F3 E Global\MSI0000
C:\Windows\SysWOW64\msiexec.exe
c:\Windows\syswow64\MsiExec.exe -Embedding 417DB550FCDE732E3591759ED0C0D26B E Global\MSI0000
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll" /queue:3 /NoDependencies
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 31 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://wixtoolset.org/schemas/thmutil/2010g_VST
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/Prereqs/VC_REDIST/vc_red
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-servi
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/en-US/PluginManager-1.0.2
unknown
https://www.capitaliq.spglobal.c
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/Prereqs/VSTOR2010/vstor_
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/en-US/SPCapIQProOffice-x
unknown
http://go.microx
unknown
https://www.capitaliq.spglobal.cn/apiservices/off
unknown
https://www.capitaliq.spglobal.cn/
unknown
https://www.capitaliq.spglobal.cn/ap
unknown
https://www.capitaliq.spglobal.cn/3
unknown
https://www.capitaliq.spglobal.com/&D
unknown
http://go.m
unknown
https://www.capitaliq.spglobal.com/j_
unknown
https://www.capitaliq.spglobal.cn/-l
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/Prereqs/NDP48/ndp48-x86-x
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Co_
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/Empower/empower-1.0.2409
unknown
https://www.capitaliq.spz
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/Prereqs/VSTOR2010/vstor_r
unknown
https://www.capitaliq.spglobal
unknown
https://www.capitaliq.spglobal.cn/apiservices
unknown
https://www.capitaliq.spglobal.
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/en-US/O;=
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Con
unknown
https://www.capitaliq.spglobal.cn/apiservices/of=
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/en-US/OfficeTools-x86-1.0
unknown
https://ecs.syr.edu/faculty/fawcett/handouts/Coretechnologies/WindowsProgramming/WinUser.h
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/en-US/OfficeTools-x64-1.
unknown
https://www.capitaliq.spglobal.com/G~
unknown
http://go.microsoft.co
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/Prereqs/VC_REDIST/vc_redi
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/en-US/OfficeTools-x64-1.0
unknown
https://www.capitaliq.spglobal.com/apiservices/offiQB
unknown
https://www.capitaliq.spglobal.com/apiservices/office-too
unknown
https://www.capitaliq.spglobal.com/apiservices/office-t7B
unknown
http://schemas.microsoft.
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/Empower/e
unknown
http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
unknown
https://www.capitaliq.spglobal.com/
unknown
https://www.capitaliq.spglobal.co
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/en-US/OfficeTools-x86-1.
unknown
https://www.capitaliq.spglobal.cn/w
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/C
unknown
https://www.capitaliq.spglobal.com/apis
unknown
https://www.capitaliq.
unknown
http://wixtoolset.org/schemas/thmutil/2010(
unknown
https://www.capitaliq.spglobal.cn/r_CN_1.0.24095.1.msi
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/en-US/PluginManager-1.0.
unknown
http://ocsp.dig
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/Content/Prereqs/NDP48/ndp48-x86-
unknown
https://www.capitaliq.spglobal.com/S_m
unknown
https://www.capitaliq.s
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/en-US/SPCapIQProOffice-x8
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Content/en-US/SPCapIQProOffice-x6
unknown
http://crl3.digic
unknown
https://www.capitaliq.spgloba
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-
unknown
https://www.capitaliq.spglobal.com/apiservices/office-tools-service/C
unknown
https://www.capitaliq.spglobal.cn/apiservices/office-tools-service/Conte
unknown
http://appsyndication.org/2006/appsyn
unknown
There are 53 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
173.222.249.26
unknown
United States
96.16.60.197
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{56aa9754-57aa-4a26-a164-12075d94eb2e}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{56aa9754-57aa-4a26-a164-12075d94eb2e}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{56aa9754-57aa-4a26-a164-12075d94eb2e}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{56aa9754-57aa-4a26-a164-12075d94eb2e}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{56aa9754-57aa-4a26-a164-12075d94eb2e}
BundleResumeCommandLine
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{8ABF444C-2498-4B37-A960-91BFE1481ED5}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{8ABF444C-2498-4B37-A960-91BFE1481ED5}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{8ABF444C-2498-4B37-A960-91BFE1481ED5}
DisplayName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
TypesSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\44aade.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\44aade.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E4C35488E6280433B4A9504AC59CB06
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\48DB41415A9D5EE3AA3711D8C7703207
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\atl100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6432CE2221869C437BF73206B4A1E41B
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22ADB29655D63AE309B41371AFB2D2E9
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3121A08DAA1666E37A639F747E57545C
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33BEF75DAFB5F5C329FE5CA253A07615
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\047DE1C57A5C26139B5BF06B6D9DFF6F
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\56111199315302F42AC73C5FF3218BB7
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7CF850295E2D47645AEFFBA1C9CC66EA
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3359B1A2C0F81F946AEF6C0290F0A763
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1DBFA1B595D618049AFE66A3138BEBC3
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\115EA997438B7F93F8EBF155CE5AC35E
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89D167C9B8F306038ADB87ABC137D43C
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\875C7AC1A0E5BC73CB72373226AAD9BD
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5B04B31931FA00D3AA3B549FD8C294E4
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\68906D3817F80033788F39B2CDB04A46
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2D17D06B78004283AA6BF0AA19CB15E7
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7B309DE9782D3B03BA3458C9AA813CAF
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\910EF7B196FE3FC3DBAD7F52B0B08C90
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C75EBF6F23C451638BFC95A448A5DF5A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\99D2BF5454562ED3C83E4A7240732963
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\92FAE698793B37F32BE7F3134BDB9F43
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\87EF562482125DD308EDDD0E6F66C1B7
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BC317862D77574B3A83C28AACCB97845
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E9AA9A9D8AD3A493C98E18E0094A9742
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\005795EE21257AD309A727EEB92C170A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FBEBD44A7A81B583BAEA6B7CB3D8EEA9
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\90D46FCF40BAA9D3989112821BABDC96
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E5E15F640714003AA9E0E3C22AD3784
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0D39492ED022EA1378DA89B0B3E37685
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\68AB67CA330133017706CB5110E47A00
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860\68AB67CA330133017706CB5110E47A00
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844\68AB67CA330133017706CB5110E47A00
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3121A08DAA1666E37A639F747E57545C\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3121A08DAA1666E37A639F747E57545C\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3121A08DAA1666E37A639F747E57545C\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33BEF75DAFB5F5C329FE5CA253A07615\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\047DE1C57A5C26139B5BF06B6D9DFF6F\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6432CE2221869C437BF73206B4A1E41B\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6432CE2221869C437BF73206B4A1E41B\68AB67CA330133017706CB5110E47A00
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6432CE2221869C437BF73206B4A1E41B\68AB67CA330133017706CB5110E47A00
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB\68AB67CA330133017706CB5110E47A00
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22ADB29655D63AE309B41371AFB2D2E9\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22ADB29655D63AE309B41371AFB2D2E9\68AB67CA330133017706CB5110E47A00
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22ADB29655D63AE309B41371AFB2D2E9\68AB67CA330133017706CB5110E47A00
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653\68AB67CA330133017706CB5110E47A00
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2467173
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2151757
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB982573
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86\KB2565063
Present
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2524860
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2544655
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2549743
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2565063
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\SP1\KB2565063
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
VCRedist_x86_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
VCRedist_x86_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
VC_RED_enu_x86_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
VC_RED_enu_x86_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2467173
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2467173
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2151757
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2151757
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB982573
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB982573
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2565063
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2565063
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
FT_VCRedist_x86_KB2565063_Detection
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
FT_VCRedist_x86_KB2565063_Detection
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2524860
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2524860
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2544655
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2544655
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2549743
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2549743
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
MSI3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
State
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
Uninstallable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
LUAEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
PatchType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\2D0058F6F08A743309184BE1178C95B2
MoreInfoURL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches
2D0058F6F08A743309184BE1178C95B2
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Patches\2D0058F6F08A743309184BE1178C95B2\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Patches\2D0058F6F08A743309184BE1178C95B2\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Patches\2D0058F6F08A743309184BE1178C95B2\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Patches\2D0058F6F08A743309184BE1178C95B2\SourceList\Media
100
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Patches\2D0058F6F08A743309184BE1178C95B2\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Patches\2D0058F6F08A743309184BE1178C95B2
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches
Patches
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Media
100
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\TempPackages
c:\Windows\Installer\44aadc.msp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\44aae4.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\44aae4.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0480DC222D01C4F37A2077C032048022
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C065BA555D648923380AAA2171113286
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\atl100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\msvcr100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\620139E0B929C2837B208B4B3039995E
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\ECB55D8E45AD89E3ABDB0106D70A6E43
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D6D942287155543986F9D6AA8A889D8
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfcm100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\85DC899F7C7D0943287A010C770E5157
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfcm100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C47EBEC423D7F53DB1EEE945FDBCD8A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BCC9D60832651123697145128BA363CD
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D36DFC997E9185F35AB455F4D8BD1B1A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F8EB9A0EB7EC15836A7C7990CEBED33B
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D78CB0019EFD4A33A0ABCFAA2C03AB4
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BDB781F79E72FF43CAB8883AFF23E660
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D4362D900DD7D6230A3E66C3B0972A6F
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\287437C084320CB3089DE68F3E9FE6B0
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5F2E2998E12FC436878E5B253CCE503
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\vcomp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\044B2B18FBDD5823299BD88873C05DE3
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B06753C403720374B9E802BE9E719431
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5CAF4A81CCE45D84F9FC1C3B54B9687A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\07F3B43BC94DD1042BE1ED9B5C4CCC80
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C71D97C391E72B947A1D2F7AE3170ABF
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5F944F375A65215459A4865E5E946126
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3179B36BEC743044A0A333654942EFD
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4684A2E4A3A8C93448734651ED824904
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89B834110C7557F428CFE89BE015E15E
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\82030D4870482E948B98A5D438C2775A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3808C13B64A39CB4999AD62BB57ED0AC
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E8D57C26BBC0BA4086B6AE65D820A79
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\14858EE00FA16FF4A80DF096D0BE8551
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E95CC18FA93667244A3962E18E1CD468
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\115EA997438B7F93F8EBF155CE5AC35E
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89D167C9B8F306038ADB87ABC137D43C
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\875C7AC1A0E5BC73CB72373226AAD9BD
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C317FAE26421C5539BAD7FD383D422DB
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\90F69BE67CFD67C358567DC8B6FCE330
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BA8D27FBFAFD537398A986A1F078560B
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\59156F9E7CA1EA7339861E2DEB3E61E3
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EE0424FCA4735153A96ECB40175811C1
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DCF641B65CE867A3FA014E05B4FFB233
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2CBF9AE5E7D63D437A0A3CB6E3246D65
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\165CD855CB3CECA389F18FA400EF06BC
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CDB0E4A5A741FD33EBEAD84F47016A6A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\68DB04C2E631ACB3C87087A18DD8C363
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A113AE2367986D6349C713E139B192B0
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5A1A9373391361B33B5C39D0A72E69EC
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E0671D8017F7843BBA0C2E918C6E7EE
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CCB9282073986CA339C909012CFC4B26
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6E91109C5A77AA4348935489B533D8C9
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E303F83D271ABA430B5719C49AC5AEF9
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\171C4EA6433E57431A371D528D617C3D
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7\1926E8D15D0BCE53481466615F760A7F
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Program Files\Common Files\Microsoft Shared\VC\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699\1926E8D15D0BCE53481466615F760A7F
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\ECB55D8E45AD89E3ABDB0106D70A6E43\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D36DFC997E9185F35AB455F4D8BD1B1A\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BCC9D60832651123697145128BA363CD\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D78CB0019EFD4A33A0ABCFAA2C03AB4\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F8EB9A0EB7EC15836A7C7990CEBED33B\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BDB781F79E72FF43CAB8883AFF23E660\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D4362D900DD7D6230A3E66C3B0972A6F\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\287437C084320CB3089DE68F3E9FE6B0\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA\1926E8D15D0BCE53481466615F760A7F
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816\1926E8D15D0BCE53481466615F760A7F
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816\1926E8D15D0BCE53481466615F760A7F
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816\1926E8D15D0BCE53481466615F760A7F
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816\1926E8D15D0BCE53481466615F760A7F
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcr100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\bootstrap.vsto.1\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\bootstrap.vsto.1\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.vsto\shell\edit\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC04D82C-AA59-4ba4-96B1-27BE3FF05E00}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99E0D1EC-0A0D-4E50-B8A1-82A8B6ECE5CB}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A37BBB42-E8C1-4E09-B9CA-F009CE620C08}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VSTO Runtime Setup\v4
InstallerPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Schema Library\ActionsPane3\0
Location
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E985809A-84A6-4F35-86D6-9B52119AB9D7}\9.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AAB9C2AA-6036-4AE1-A41C-A40AB7F39520}\a.0
NULL
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSTO 4.0
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E985809A-84A6-4F35-86D6-9B52119AB9D7}\9.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E985809A-84A6-4F35-86D6-9B52119AB9D7}\9.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E985809A-84A6-4F35-86D6-9B52119AB9D7}\9.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E985809A-84A6-4F35-86D6-9B52119AB9D7}\9.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{18987285-971B-4C88-AEA9-2A5600861BA5}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BB13B3C3-AF9B-43DB-9DF8-B2F65AA5E21B}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2A792539-9CEA-4A63-A80A-A645FEF2046A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2A792539-9CEA-4A63-A80A-A645FEF2046A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2A792539-9CEA-4A63-A80A-A645FEF2046A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2A792539-9CEA-4A63-A80A-A645FEF2046A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2A792539-9CEA-4A63-A80A-A645FEF2046A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FC30CDDE-9AD1-455D-A1BE-4B0D90ECEC92}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{FC30CDDE-9AD1-455D-A1BE-4B0D90ECEC92}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{FC30CDDE-9AD1-455D-A1BE-4B0D90ECEC92}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{FC30CDDE-9AD1-455D-A1BE-4B0D90ECEC92}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2DDBF3D4-8CB8-43CF-B1CA-834987325EE1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2DDBF3D4-8CB8-43CF-B1CA-834987325EE1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{70B31271-BC47-4EB8-8074-67D06378D691}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{70B31271-BC47-4EB8-8074-67D06378D691}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{70B31271-BC47-4EB8-8074-67D06378D691}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{70B31271-BC47-4EB8-8074-67D06378D691}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{70B31271-BC47-4EB8-8074-67D06378D691}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D7FA6F5E-9122-4900-8846-5AB0A5499D52}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D7FA6F5E-9122-4900-8846-5AB0A5499D52}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EFC9437E-3A57-487C-8471-9151D2FC1832}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EFC9437E-3A57-487C-8471-9151D2FC1832}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EFC9437E-3A57-487C-8471-9151D2FC1832}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6F81EA95-074E-48D4-AA96-62197E0AE96F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6F81EA95-074E-48D4-AA96-62197E0AE96F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6F81EA95-074E-48D4-AA96-62197E0AE96F}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6F81EA95-074E-48D4-AA96-62197E0AE96F}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6F81EA95-074E-48D4-AA96-62197E0AE96F}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{507171A9-0D7B-47CA-8DF5-56B23ACDC623}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{507171A9-0D7B-47CA-8DF5-56B23ACDC623}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10EF4AB3-4FAA-46C3-8832-B6247F0CF15C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10EF4AB3-4FAA-46C3-8832-B6247F0CF15C}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10EF4AB3-4FAA-46C3-8832-B6247F0CF15C}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{10EF4AB3-4FAA-46C3-8832-B6247F0CF15C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{10EF4AB3-4FAA-46C3-8832-B6247F0CF15C}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AAB9C2AA-6036-4AE1-A41C-A40AB7F39520}\a.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AAB9C2AA-6036-4AE1-A41C-A40AB7F39520}\a.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AAB9C2AA-6036-4AE1-A41C-A40AB7F39520}\a.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AAB9C2AA-6036-4AE1-A41C-A40AB7F39520}\a.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots
WorkPending
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots
WorkPending
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInViews/Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInViews/Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInViews/Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInViews/Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInViews/Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInViews/Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/AddInSideAdapters/Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll\0
Status
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll\0
Scenario
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727\NGenService\Roots\c:/Program Files (x86)/Common Files/Microsoft Shared/VSTA/Pipeline.v10.0/Contracts/Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll
Status
There are 888 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C14000
heap
page read and write
410F000
stack
page read and write
1700000
trusted library allocation
page read and write
1400000
heap
page read and write
210C7006000
trusted library allocation
page read and write
3970000
heap
page read and write
3020000
trusted library allocation
page read and write
3310000
heap
page read and write
3B9E000
trusted library allocation
page read and write
3141000
heap
page read and write
210C7002000
trusted library allocation
page read and write
37B4000
trusted library allocation
page read and write
3141000
heap
page read and write
33C0000
heap
page read and write
234C4790000
heap
page read and write
210C700C000
trusted library allocation
page read and write
36AC000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
12FE000
stack
page read and write
234C4AFA000
trusted library allocation
page read and write
389D000
trusted library allocation
page read and write
BF6000
heap
page read and write
27E0000
heap
page read and write
3B9F000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
363D000
stack
page read and write
234C2E73000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
39B3000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
1489000
heap
page read and write
3141000
heap
page read and write
3897000
trusted library allocation
page read and write
38D7000
trusted library allocation
page read and write
65C0000
heap
page read and write
72D0000
remote allocation
page read and write
234C2E57000
heap
page read and write
210C5021000
heap
page read and write
36AB000
trusted library allocation
page read and write
13DB000
heap
page read and write
3141000
heap
page read and write
3A35000
trusted library allocation
page read and write
37E7000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
32D0000
heap
page read and write
2E43000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
37BF000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
7FF7AEC20000
unkown
page readonly
37FE000
trusted library allocation
page read and write
1AB000
unkown
page readonly
210C50D0000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
2AFA000
trusted library section
page read and write
3A45000
heap
page read and write
2FC0000
trusted library allocation
page read and write
13CF000
heap
page read and write
3790000
heap
page read and write
36EB000
trusted library allocation
page read and write
3145000
heap
page read and write
13C7000
heap
page read and write
36DA000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
3B97000
trusted library allocation
page read and write
36EE000
trusted library allocation
page read and write
32F8000
stack
page read and write
3593000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
3A3E000
stack
page read and write
3050000
heap
page read and write
3300000
heap
page read and write
350D000
trusted library allocation
page read and write
1469000
heap
page read and write
3141000
heap
page read and write
13DB000
heap
page read and write
210C7004000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
3843000
trusted library allocation
page read and write
10C5000
heap
page read and write
234C2E57000
heap
page read and write
3945000
trusted library allocation
page read and write
3460000
heap
page read and write
3C0C000
stack
page read and write
3141000
heap
page read and write
100C000
unkown
page read and write
210C7005000
trusted library allocation
page read and write
3B10000
heap
page read and write
6BE77000
unkown
page read and write
1469000
heap
page read and write
234C2EBA000
heap
page read and write
1CA000
unkown
page read and write
210C504F000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
2C80000
heap
page read and write
367A000
trusted library allocation
page read and write
3630000
heap
page read and write
134D000
stack
page read and write
500000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
146F000
heap
page read and write
5900000
heap
page read and write
234C2EA5000
heap
page read and write
3141000
heap
page read and write
1418000
heap
page read and write
37BD000
trusted library allocation
page read and write
1074000
heap
page read and write
36FB000
stack
page read and write
210C7004000
trusted library allocation
page read and write
14BB000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
234C2EA9000
heap
page read and write
210C7004000
trusted library allocation
page read and write
1B4000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
36C0000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
210C7002000
trusted library allocation
page read and write
3141000
heap
page read and write
210C506A000
heap
page read and write
3630000
heap
page read and write
33B0000
heap
page read and write
2E56000
trusted library allocation
page read and write
3A38000
trusted library allocation
page read and write
350E000
trusted library allocation
page read and write
36AE000
trusted library allocation
page read and write
1276000
heap
page read and write
234C4AF1000
trusted library allocation
page read and write
C24000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
142B000
heap
page read and write
3650000
heap
page read and write
BF6000
heap
page read and write
234C2E75000
heap
page read and write
2FF0000
trusted library allocation
page read and write
C34000
heap
page read and write
1463000
heap
page read and write
39E3000
trusted library allocation
page read and write
210C506A000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
3042000
heap
page read and write
210C7000000
trusted library allocation
page read and write
13DC000
heap
page read and write
147D000
heap
page read and write
31D0000
heap
page read and write
1B22C320000
heap
page read and write
14B6000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
3141000
heap
page read and write
39E9000
trusted library allocation
page read and write
1CA000
unkown
page read and write
234C4AFF000
trusted library allocation
page read and write
3020000
heap
page read and write
210C4FD0000
heap
page read and write
1473000
heap
page read and write
394A000
trusted library allocation
page read and write
1B4000
heap
page read and write
3160000
heap
page read and write
367E000
stack
page read and write
491F000
stack
page read and write
1B4000
heap
page read and write
3141000
heap
page read and write
2E20000
heap
page read and write
10DD000
heap
page read and write
234C2E75000
heap
page read and write
210C700A000
trusted library allocation
page read and write
39FB000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
3141000
heap
page read and write
764000
heap
page read and write
377A000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
110F000
heap
page read and write
210C5065000
heap
page read and write
4D90000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
10DE000
heap
page read and write
13DC000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
210C504E000
heap
page read and write
3B95000
trusted library allocation
page read and write
10BC000
heap
page read and write
14CD000
heap
page read and write
36DF000
trusted library allocation
page read and write
140000
heap
page read and write
3920000
heap
page read and write
3141000
heap
page read and write
554000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
3150000
heap
page read and write
370D000
trusted library allocation
page read and write
3FA4000
trusted library allocation
page read and write
69B000
unkown
page readonly
39BF000
trusted library allocation
page read and write
10DB000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
3380000
heap
page read and write
3190000
heap
page read and write
1429000
heap
page read and write
2E47000
trusted library allocation
page read and write
234C2EB9000
heap
page read and write
2FC0000
trusted library allocation
page read and write
835000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
3141000
heap
page read and write
3AD2000
trusted library allocation
page read and write
3300000
heap
page read and write
3141000
heap
page read and write
550000
heap
page read and write
17D0000
heap
page read and write
141B000
heap
page read and write
234C2EA0000
heap
page read and write
210C5021000
heap
page read and write
14A6000
heap
page read and write
6ED000
heap
page read and write
3141000
heap
page read and write
3706000
trusted library allocation
page read and write
10D8000
heap
page read and write
37FC000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
3141000
heap
page read and write
14BB000
heap
page read and write
1404000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
253A000
heap
page read and write
941000
unkown
page execute read
3190000
heap
page read and write
3ADD000
trusted library allocation
page read and write
13DB000
heap
page read and write
37D0000
heap
page read and write
3141000
heap
page read and write
3944000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
3600000
heap
page read and write
EF44EFF000
stack
page read and write
13DB000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
234C2EB8000
heap
page read and write
6D0000
heap
page read and write
13DB000
heap
page read and write
13DB000
heap
page read and write
210C504D000
heap
page read and write
234C2E57000
heap
page read and write
1284000
heap
page read and write
13E0000
heap
page read and write
39B1000
trusted library allocation
page read and write
210C5006000
heap
page read and write
234C2E73000
heap
page read and write
377E000
trusted library allocation
page read and write
5E00000
direct allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
234C2EB9000
heap
page read and write
3141000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
370C000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
2FEC000
stack
page read and write
33A0000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
3320000
heap
page read and write
4DB5000
heap
page read and write
210C5006000
heap
page read and write
13E1000
heap
page read and write
234C2E75000
heap
page read and write
1284000
heap
page read and write
1418000
heap
page read and write
6D4000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
3633000
trusted library allocation
page read and write
383E000
stack
page read and write
363B000
trusted library allocation
page read and write
702C000
stack
page read and write
3B9D000
trusted library allocation
page read and write
13E2000
heap
page read and write
3816000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
393F000
trusted library allocation
page read and write
13E0000
heap
page read and write
930000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
1468000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
2E45000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
2FA0000
heap
page read and write
315E000
heap
page read and write
3141000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
14BB000
heap
page read and write
210C7003000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
13DE000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
920000
heap
page read and write
428D000
stack
page read and write
9AA000
unkown
page read and write
1002000
unkown
page execute read
1F8CD7E0000
heap
page read and write
2FE0000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
39B5000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
13DC000
heap
page read and write
5A4000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
1000000
unkown
page readonly
386A000
trusted library allocation
page read and write
3A3C000
trusted library allocation
page read and write
389C000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
1429000
heap
page read and write
10E1000
heap
page read and write
725000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
14CD000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
325D000
heap
page read and write
3141000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
142B000
heap
page read and write
3141000
heap
page read and write
3899000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
D70F4FE000
stack
page read and write
234C4AFC000
trusted library allocation
page read and write
19E000
stack
page read and write
3A57000
trusted library allocation
page read and write
387A000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
C03000
heap
page read and write
3310000
heap
page read and write
146B000
heap
page read and write
1415000
heap
page read and write
3141000
heap
page read and write
6BD000
unkown
page readonly
210C6FFB000
trusted library allocation
page read and write
39E2000
trusted library allocation
page read and write
14B5000
heap
page read and write
234C2EA5000
heap
page read and write
3141000
heap
page read and write
161000
unkown
page execute read
234C4B06000
trusted library allocation
page read and write
2FA0000
heap
page read and write
755000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
37B8000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
3141000
heap
page read and write
38A6000
trusted library allocation
page read and write
1429000
heap
page read and write
210C6FF5000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
3846000
trusted library allocation
page read and write
39BA000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
147D000
heap
page read and write
36EC000
trusted library allocation
page read and write
3041000
heap
page read and write
1B4000
heap
page read and write
3FA4000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
13DB000
heap
page read and write
2DA0000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
FE0000
heap
page read and write
37FB000
trusted library allocation
page read and write
3B94000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
10E3000
heap
page read and write
210C5006000
heap
page read and write
2E5E000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
3ADB000
trusted library allocation
page read and write
D70F5FE000
stack
page read and write
55BE000
stack
page read and write
1002000
unkown
page execute read
234C4AFB000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
234C4990000
heap
page read and write
1418000
heap
page read and write
234C2E73000
heap
page read and write
396E000
trusted library allocation
page read and write
3141000
heap
page read and write
3770000
trusted library allocation
page read and write
1710000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
2750000
heap
page read and write
13D3000
heap
page read and write
2ED0000
trusted library allocation
page read and write
36DF000
trusted library allocation
page read and write
3850000
heap
page read and write
38B7000
trusted library allocation
page read and write
3963000
trusted library allocation
page read and write
3988000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
10E1000
heap
page read and write
35D0000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
146F000
heap
page read and write
5BC000
stack
page read and write
147E000
heap
page read and write
210C5006000
heap
page read and write
6CC2D000
unkown
page readonly
210C5051000
heap
page read and write
38C0000
heap
page read and write
210C506A000
heap
page read and write
210C506C000
heap
page read and write
33C0000
trusted library allocation
page read and write
2D90000
heap
page read and write
3880000
heap
page read and write
3B7D000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
394F000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
71A8000
heap
page read and write
3B22000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
1310000
heap
page read and write
3141000
heap
page read and write
146F000
heap
page read and write
1469000
heap
page read and write
234C2EA5000
heap
page read and write
14BB000
heap
page read and write
3B75000
trusted library allocation
page read and write
3660000
heap
page read and write
1452000
heap
page read and write
C36000
heap
page read and write
3508000
heap
page read and write
BEB000
stack
page read and write
381B000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
590000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
3010000
heap
page read and write
1418000
heap
page read and write
210C7004000
trusted library allocation
page read and write
5A4000
heap
page read and write
13C7000
heap
page read and write
13CF000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
39B3000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
36A0000
heap
page read and write
2D20000
trusted library allocation
page read and write
1700000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
38DD000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
13DB000
heap
page read and write
3141000
heap
page read and write
3894000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
1416000
heap
page read and write
1395000
heap
page read and write
210C7005000
trusted library allocation
page read and write
377F000
trusted library allocation
page read and write
3141000
heap
page read and write
C33000
heap
page read and write
234C2EA5000
heap
page read and write
3141000
heap
page read and write
53EF000
stack
page read and write
3EA0000
trusted library section
page read and write
6E4000
heap
page read and write
3820000
heap
page read and write
3705000
trusted library allocation
page read and write
296BDAD0000
heap
page read and write
146F000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
C05000
heap
page read and write
3163000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
384B000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
4D95000
heap
page read and write
35A6000
trusted library allocation
page read and write
3B2B000
trusted library allocation
page read and write
3A32000
trusted library allocation
page read and write
3070000
heap
page read and write
13D0000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
13D4000
heap
page read and write
13DB000
heap
page read and write
3942000
trusted library allocation
page read and write
210C5051000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
3775000
trusted library allocation
page read and write
210C5051000
heap
page read and write
3893000
trusted library allocation
page read and write
3500000
heap
page read and write
554000
heap
page read and write
2FC0000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
9C000
stack
page read and write
3961000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
155F000
stack
page read and write
3709000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
10E1000
heap
page read and write
3A43000
heap
page read and write
3180000
heap
page read and write
1700000
trusted library allocation
page read and write
6BD000
unkown
page readonly
39B9000
trusted library allocation
page read and write
1710000
heap
page read and write
234C2E57000
heap
page read and write
FB0000
heap
page read and write
13EA000
heap
page read and write
14BB000
heap
page read and write
3141000
heap
page read and write
298C000
stack
page read and write
234C4B03000
trusted library allocation
page read and write
1468000
heap
page read and write
314C000
heap
page read and write
3350000
heap
page read and write
32E0000
heap
page read and write
3620000
heap
page read and write
3476000
trusted library allocation
page read and write
36ED000
trusted library allocation
page read and write
650000
heap
page read and write
14BB000
heap
page read and write
141B000
heap
page read and write
10EC000
heap
page read and write
37B2000
trusted library allocation
page read and write
3675000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
210C506A000
heap
page read and write
14AC000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
3874000
trusted library allocation
page read and write
6CE000
heap
page read and write
3180000
heap
page read and write
210C5006000
heap
page read and write
37E0000
trusted library allocation
page read and write
210C5021000
heap
page read and write
315E000
heap
page read and write
137F000
heap
page read and write
210C5021000
heap
page read and write
C33000
heap
page read and write
2A40000
trusted library allocation
page read and write
1429000
heap
page read and write
3141000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
2EF0000
heap
page read and write
1291000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
825000
heap
page read and write
210C7004000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
350A000
trusted library allocation
page read and write
11DB000
stack
page read and write
FE6000
heap
page read and write
37FB000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
296BDE10000
heap
page read and write
2B00000
trusted library section
page read and write
13DB000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
36F0000
heap
page read and write
10EE000
heap
page read and write
39B4000
trusted library allocation
page read and write
718F000
stack
page read and write
234C4B06000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
3948000
trusted library allocation
page read and write
1429000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
1469000
heap
page read and write
3680000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3141000
heap
page read and write
39E7000
trusted library allocation
page read and write
B46000
trusted library allocation
page read and write
350B000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2E75000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
2FF0000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
146F000
heap
page read and write
64F000
stack
page read and write
439E000
stack
page read and write
13C7000
heap
page read and write
10A5000
heap
page read and write
38B1000
trusted library allocation
page read and write
147A000
heap
page read and write
396C000
trusted library allocation
page read and write
210C5021000
heap
page read and write
37FF000
trusted library allocation
page read and write
210C504D000
heap
page read and write
2F00000
trusted library allocation
page read and write
30F4000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
3041000
heap
page read and write
3020000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
3B77000
trusted library allocation
page read and write
1010000
heap
page read and write
27AE000
stack
page read and write
31D0000
heap
page read and write
210C5006000
heap
page read and write
3A60000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
3141000
heap
page read and write
210C504E000
heap
page read and write
37E9000
trusted library allocation
page read and write
36E5000
trusted library allocation
page read and write
146F000
heap
page read and write
36F0000
heap
page read and write
1390000
heap
page read and write
5F0000
heap
page read and write
BF4000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
39EB000
trusted library allocation
page read and write
1429000
heap
page read and write
6BDC0000
unkown
page readonly
768000
heap
page read and write
3639000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
9B0000
heap
page read and write
234C2EB8000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
3701000
trusted library allocation
page read and write
3530000
heap
page read and write
3970000
heap
page read and write
381D000
trusted library allocation
page read and write
10A9000
heap
page read and write
210C506A000
heap
page read and write
3705000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
14B8000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
3A9B000
stack
page read and write
210C5051000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
BB0000
heap
page read and write
3B94000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
36B0000
heap
page read and write
3862000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
13DE000
heap
page read and write
37F4000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
3141000
heap
page read and write
1B22C13C000
heap
page read and write
110F000
heap
page read and write
6FA000
stack
page read and write
398D000
trusted library allocation
page read and write
14B6000
heap
page read and write
10DB000
heap
page read and write
FE0000
heap
page read and write
3636000
trusted library allocation
page read and write
3702000
trusted library allocation
page read and write
3907000
trusted library allocation
page read and write
210C6B70000
heap
page read and write
17C000
stack
page read and write
3141000
heap
page read and write
403E000
stack
page read and write
54F000
stack
page read and write
234C2EA5000
heap
page read and write
3141000
heap
page read and write
554000
heap
page read and write
39FE000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
2FA0000
heap
page read and write
3141000
heap
page read and write
234C2E9F000
heap
page read and write
10AA000
heap
page read and write
776000
heap
page read and write
296BF7A0000
heap
page read and write
3984000
trusted library allocation
page read and write
3700000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
210C5051000
heap
page read and write
3680000
heap
page read and write
2FF0000
trusted library allocation
page read and write
146E000
heap
page read and write
39D2000
trusted library allocation
page read and write
37F3000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
B60000
unkown
page read and write
13A4000
heap
page read and write
234C2EB8000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
210C5051000
heap
page read and write
234C2EBA000
heap
page read and write
39D3000
trusted library allocation
page read and write
3D35000
stack
page read and write
BF4000
heap
page read and write
3FA7000
trusted library allocation
page read and write
1429000
heap
page read and write
210C5021000
heap
page read and write
14CD000
heap
page read and write
1429000
heap
page read and write
38DF000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
4DDE000
stack
page read and write
210C7002000
trusted library allocation
page read and write
3141000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
381C000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
210C7008000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
2FB0000
heap
page read and write
370C000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
147B000
heap
page read and write
3141000
heap
page read and write
8FB000
stack
page read and write
143C000
heap
page read and write
2D20000
trusted library allocation
page read and write
3B38000
trusted library allocation
page read and write
AF8000
stack
page read and write
234C2DF0000
trusted library allocation
page read and write
210C5021000
heap
page read and write
69B000
unkown
page readonly
234C4B03000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
398D000
trusted library allocation
page read and write
3706000
trusted library allocation
page read and write
13DB000
heap
page read and write
13F0000
trusted library allocation
page read and write
1CD000
unkown
page readonly
2DA0000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
BB0000
heap
page read and write
3FA9000
trusted library allocation
page read and write
234C2EB8000
heap
page read and write
1429000
heap
page read and write
234C2E73000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
141B000
heap
page read and write
210C7003000
trusted library allocation
page read and write
1B4000
heap
page read and write
146B000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
3141000
heap
page read and write
3370000
heap
page read and write
3610000
heap
page read and write
2FC0000
trusted library allocation
page read and write
146F000
heap
page read and write
3703000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
3241000
heap
page read and write
3865000
trusted library allocation
page read and write
2FD0000
heap
page read and write
3830000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
19C000
stack
page read and write
39BC000
trusted library allocation
page read and write
3660000
heap
page read and write
1AB000
unkown
page readonly
C3B000
heap
page read and write
234C2E73000
heap
page read and write
1CA000
unkown
page write copy
2E48000
trusted library allocation
page read and write
39DB000
trusted library allocation
page read and write
3141000
heap
page read and write
3A36000
trusted library allocation
page read and write
2FD0000
heap
page read and write
3141000
heap
page read and write
389E000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
210C506A000
heap
page read and write
3630000
heap
page read and write
234C2E10000
heap
page read and write
16FE000
stack
page read and write
3020000
trusted library allocation
page read and write
37EC000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
F99000
stack
page read and write
730000
heap
page read and write
31D0000
heap
page read and write
37F1000
trusted library allocation
page read and write
3141000
heap
page read and write
6E4000
heap
page read and write
2E51000
trusted library allocation
page read and write
210C504F000
heap
page read and write
C42000
heap
page read and write
F77F4FE000
stack
page read and write
210C7009000
trusted library allocation
page read and write
13DB000
heap
page read and write
210C7000000
trusted library allocation
page read and write
28299B60000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
381E000
trusted library allocation
page read and write
6CC2B000
unkown
page read and write
146F000
heap
page read and write
F77F2FB000
stack
page read and write
1F8CD86E000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
282999C0000
heap
page read and write
234C4B0B000
trusted library allocation
page read and write
3938000
trusted library allocation
page read and write
210C5051000
heap
page read and write
3A42000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
234C2EA0000
heap
page read and write
210C5006000
heap
page read and write
3934000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
302C000
heap
page read and write
1710000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
29F0000
heap
page read and write
14D7000
heap
page read and write
39A0000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
3141000
heap
page read and write
2D00000
unkown
page readonly
210C506A000
heap
page read and write
3650000
heap
page read and write
234C2EB8000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
3141000
heap
page read and write
210C5065000
heap
page read and write
234C2E75000
heap
page read and write
1AB000
unkown
page readonly
3FA6000
trusted library allocation
page read and write
3868000
trusted library allocation
page read and write
13DB000
heap
page read and write
141B000
heap
page read and write
37BC000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
3430000
heap
page read and write
210C504E000
heap
page read and write
210C5051000
heap
page read and write
C46000
heap
page read and write
2F00000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
234C2EB8000
heap
page read and write
3141000
heap
page read and write
234C2E75000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
58E5000
heap
page read and write
147D000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
31A20FE000
stack
page read and write
3141000
heap
page read and write
329E000
stack
page read and write
39F8000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
F90000
heap
page read and write
33B0000
heap
page read and write
37E0000
heap
page read and write
3FA1000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
3470000
heap
page read and write
3020000
heap
page read and write
1074000
heap
page read and write
377D000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
1F8CD849000
heap
page read and write
3902000
trusted library allocation
page read and write
210C504D000
heap
page read and write
481B000
stack
page read and write
14B8000
heap
page read and write
37E3000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
210C5021000
heap
page read and write
3A4C000
heap
page read and write
3B7C000
trusted library allocation
page read and write
1469000
heap
page read and write
2FE0000
trusted library allocation
page read and write
3B37000
trusted library allocation
page read and write
3840000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
234C2EBE000
heap
page read and write
13D5000
heap
page read and write
1735000
heap
page read and write
517000
heap
page read and write
3141000
heap
page read and write
14B8000
heap
page read and write
12FC000
stack
page read and write
147A000
heap
page read and write
3FA0000
trusted library allocation
page read and write
1084000
heap
page read and write
54A000
stack
page read and write
210C7006000
trusted library allocation
page read and write
936000
heap
page read and write
3141000
heap
page read and write
424E000
stack
page read and write
3141000
heap
page read and write
234C2E73000
heap
page read and write
3B96000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
59A000
heap
page read and write
43BC000
stack
page read and write
3750000
heap
page read and write
36D3000
trusted library allocation
page read and write
13E3000
heap
page read and write
28299B69000
heap
page read and write
3180000
heap
page read and write
3240000
heap
page read and write
36E4000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
210C5021000
heap
page read and write
390B000
trusted library allocation
page read and write
1471000
heap
page read and write
2FC0000
trusted library allocation
page read and write
6CBFB000
unkown
page read and write
234C2E73000
heap
page read and write
384A000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
10D3000
heap
page read and write
3AD0000
trusted library allocation
page read and write
2770000
heap
page read and write
3141000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
3960000
heap
page read and write
2DA0000
trusted library allocation
page read and write
3FA8000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
147D000
heap
page read and write
13E0000
heap
page read and write
3141000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
37E4000
trusted library allocation
page read and write
6B00000
direct allocation
page read and write
3330000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
6BDC1000
unkown
page execute read
3B95000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
32E0000
heap
page read and write
2FC0000
trusted library allocation
page read and write
149E000
heap
page read and write
13CF000
heap
page read and write
57DE000
stack
page read and write
6BD000
heap
page read and write
14B8000
heap
page read and write
36A0000
heap
page read and write
3940000
trusted library allocation
page read and write
210C504D000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3ADE000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
210C5051000
heap
page read and write
394C000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
1380000
heap
page read and write
6CE000
heap
page read and write
234C2E57000
heap
page read and write
3B28000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
210C6FA0000
heap
page read and write
3141000
heap
page read and write
210C7002000
trusted library allocation
page read and write
296BDBAC000
heap
page read and write
3141000
heap
page read and write
1076000
heap
page read and write
210C7005000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
210C6AC0000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
13DC000
heap
page read and write
3610000
heap
page read and write
149D000
heap
page read and write
1429000
heap
page read and write
2FC0000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
210C506A000
heap
page read and write
3848000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
1B4000
heap
page read and write
554000
heap
page read and write
39EF000
trusted library allocation
page read and write
6C9000
heap
page read and write
10AF000
heap
page read and write
F60000
heap
page read and write
38D2000
trusted library allocation
page read and write
147A000
heap
page read and write
210C4E50000
heap
page read and write
3B9C000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
13DC000
heap
page read and write
D2E307D000
stack
page read and write
10D8000
heap
page read and write
36D5000
trusted library allocation
page read and write
10D4000
heap
page read and write
31E0000
heap
page read and write
125D000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
350B000
heap
page read and write
1284000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2E9F000
heap
page read and write
370B000
trusted library allocation
page read and write
C41000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
1030000
heap
page read and write
3AD9000
trusted library allocation
page read and write
1429000
heap
page read and write
9A0000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
1384000
heap
page read and write
210C7001000
trusted library allocation
page read and write
5914000
heap
page read and write
3141000
heap
page read and write
210C7003000
trusted library allocation
page read and write
554000
heap
page read and write
704000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
3813000
trusted library allocation
page read and write
3380000
heap
page read and write
234C2EA5000
heap
page read and write
210C7002000
trusted library allocation
page read and write
3819000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
1CD000
unkown
page readonly
FF0000
heap
page read and write
39F7000
trusted library allocation
page read and write
394A000
trusted library allocation
page read and write
6BE70000
unkown
page write copy
234C2E73000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
1B0000
heap
page read and write
3970000
heap
page read and write
35C0000
heap
page read and write
210C5006000
heap
page read and write
210C7003000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
835000
heap
page read and write
36E8000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
28299D80000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
147E000
heap
page read and write
3904000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
32A0000
heap
page read and write
3040000
heap
page read and write
210C7000000
trusted library allocation
page read and write
3860000
trusted library allocation
page read and write
3A40000
heap
page read and write
2D20000
trusted library allocation
page read and write
4D98000
heap
page read and write
3908000
trusted library allocation
page read and write
36E5000
trusted library allocation
page read and write
3141000
heap
page read and write
39BB000
trusted library allocation
page read and write
234C2E28000
heap
page read and write
10DE000
heap
page read and write
39B6000
trusted library allocation
page read and write
5100000
heap
page read and write
13FD000
heap
page read and write
234C2E9F000
heap
page read and write
1276000
heap
page read and write
210C7006000
trusted library allocation
page read and write
1420000
heap
page read and write
10F0000
heap
page read and write
13DB000
heap
page read and write
210C506A000
heap
page read and write
386D000
trusted library allocation
page read and write
36EA000
trusted library allocation
page read and write
407E000
stack
page read and write
6BDA1000
unkown
page readonly
2D20000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
398C000
trusted library allocation
page read and write
145E000
stack
page read and write
45FF000
stack
page read and write
13CF000
heap
page read and write
10CF000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3070000
heap
page read and write
2AF0000
trusted library section
page read and write
147E000
heap
page read and write
D2E31FF000
stack
page read and write
3340000
heap
page read and write
234C2EA5000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
35A0000
heap
page read and write
210C7002000
trusted library allocation
page read and write
38A0000
heap
page read and write
5A4000
heap
page read and write
2CF0000
heap
page read and write
78C000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
3B0000
heap
page read and write
3141000
heap
page read and write
3440000
unkown
page read and write
3A20000
heap
page read and write
210C504F000
heap
page read and write
141B000
heap
page read and write
1418000
heap
page read and write
39DE000
trusted library allocation
page read and write
31E0000
heap
page read and write
3A3E000
trusted library allocation
page read and write
851000
unkown
page execute read
37B1000
trusted library allocation
page read and write
3A39000
trusted library allocation
page read and write
37BD000
trusted library allocation
page read and write
234C2EBE000
heap
page read and write
3141000
heap
page read and write
3B80000
heap
page read and write
36BB000
stack
page read and write
1421000
heap
page read and write
2ED0000
trusted library allocation
page read and write
367E000
trusted library allocation
page read and write
82F000
heap
page read and write
234C2EB8000
heap
page read and write
D2E30FF000
stack
page read and write
1469000
heap
page read and write
3141000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
85A000
unkown
page readonly
147A000
heap
page read and write
10C3000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
146F000
heap
page read and write
147A000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
DD000
stack
page read and write
210C50D0000
trusted library allocation
page read and write
210C5021000
heap
page read and write
3503000
trusted library allocation
page read and write
142B000
heap
page read and write
39D0000
trusted library allocation
page read and write
3141000
heap
page read and write
12A9000
heap
page read and write
147A000
heap
page read and write
4A9C000
stack
page read and write
147E000
heap
page read and write
14B5000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
234C2EB9000
heap
page read and write
3900000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
234C4B0E000
trusted library allocation
page read and write
36B0000
heap
page read and write
234C2EB1000
heap
page read and write
5E4000
heap
page read and write
3FA0000
heap
page read and write
3141000
heap
page read and write
13D9000
heap
page read and write
EF44BCE000
stack
page read and write
2E5C000
trusted library allocation
page read and write
11000
unkown
page execute read
141B000
heap
page read and write
1429000
heap
page read and write
110F000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
3842000
trusted library allocation
page read and write
13DC000
heap
page read and write
3980000
heap
page read and write
14CD000
heap
page read and write
141A000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
37ED000
trusted library allocation
page read and write
13C8000
heap
page read and write
1483000
heap
page read and write
39F6000
trusted library allocation
page read and write
2E8E000
stack
page read and write
234C4B03000
trusted library allocation
page read and write
690000
heap
page read and write
234C2E9F000
heap
page read and write
210C5021000
heap
page read and write
384E000
trusted library allocation
page read and write
210C504D000
heap
page read and write
210C5051000
heap
page read and write
39E6000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
3141000
heap
page read and write
3000000
heap
page read and write
1710000
heap
page read and write
210C504D000
heap
page read and write
384D000
trusted library allocation
page read and write
13D7000
heap
page read and write
10DD000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
35A1000
trusted library allocation
page read and write
210C504D000
heap
page read and write
3140000
heap
page read and write
210C504D000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
3250000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
1469000
heap
page read and write
3690000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
210C6B8F000
heap
page read and write
210C504F000
heap
page read and write
160000
unkown
page readonly
234C4AF4000
trusted library allocation
page read and write
3141000
heap
page read and write
3943000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
3141000
heap
page read and write
210C7006000
trusted library allocation
page read and write
3840000
heap
page read and write
37B1000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
210C7000000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
147E000
heap
page read and write
3818000
trusted library allocation
page read and write
2A00000
heap
page read and write
37E3000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
39DD000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
32A0000
heap
page read and write
3935000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
3632000
trusted library allocation
page read and write
3B3E000
stack
page read and write
3630000
trusted library allocation
page read and write
BDD000
heap
page read and write
1406000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
3660000
heap
page read and write
390A000
trusted library allocation
page read and write
3A56000
trusted library allocation
page read and write
13E0000
heap
page read and write
37E1000
trusted library allocation
page read and write
13CB000
heap
page read and write
3A51000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
3156000
heap
page read and write
160000
unkown
page readonly
37F9000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
398B000
trusted library allocation
page read and write
3599000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
35AA000
trusted library allocation
page read and write
150000
heap
page read and write
13CF000
heap
page read and write
3704000
trusted library allocation
page read and write
3B7E000
trusted library allocation
page read and write
3674000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
1477000
heap
page read and write
210C6B80000
heap
page read and write
234C2E57000
heap
page read and write
3940000
trusted library allocation
page read and write
3141000
heap
page read and write
39BF000
trusted library allocation
page read and write
2FA0000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
37B6000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
1472000
heap
page read and write
3000000
trusted library allocation
page read and write
386F000
trusted library allocation
page read and write
690000
heap
page read and write
210C7003000
trusted library allocation
page read and write
3A50000
trusted library allocation
page read and write
37EF000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
C46000
heap
page read and write
210C7003000
trusted library allocation
page read and write
C29000
heap
page read and write
13DB000
heap
page read and write
2FC0000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
36EA000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
210C6B84000
heap
page read and write
33E0000
heap
page read and write
38F0000
heap
page read and write
13F0000
trusted library allocation
page read and write
3180000
heap
page read and write
146F000
heap
page read and write
34F0000
heap
page read and write
3817000
trusted library allocation
page read and write
851000
unkown
page execute read
210C5051000
heap
page read and write
393A000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
28299AC0000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
13DC000
heap
page read and write
3872000
trusted library allocation
page read and write
3678000
trusted library allocation
page read and write
39B1000
trusted library allocation
page read and write
1263000
heap
page read and write
393C000
trusted library allocation
page read and write
5B7000
heap
page read and write
141A000
heap
page read and write
2E46000
trusted library allocation
page read and write
234C2EB8000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
3146000
heap
page read and write
38A7000
trusted library allocation
page read and write
1506000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
10000
unkown
page readonly
370F000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
160000
unkown
page readonly
78C000
heap
page read and write
32D0000
heap
page read and write
10C8000
heap
page read and write
38B9000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
3142000
heap
page read and write
36C0000
heap
page read and write
3110000
heap
page read and write
1000000
unkown
page readonly
13F0000
heap
page read and write
51F0000
heap
page read and write
FAB000
stack
page read and write
3141000
heap
page read and write
AE0000
heap
page read and write
234C2E9F000
heap
page read and write
2B10000
trusted library section
page read and write
3679000
trusted library allocation
page read and write
1B4000
heap
page read and write
3670000
heap
page read and write
234C2EA5000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
3900000
heap
page read and write
2FC0000
trusted library allocation
page read and write
3FA3000
trusted library allocation
page read and write
147E000
heap
page read and write
234C2E75000
heap
page read and write
6B9C0000
unkown
page readonly
1395000
heap
page read and write
210C5006000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
10FB000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
5EE000
heap
page read and write
38E0000
heap
page read and write
3506000
heap
page read and write
38B5000
trusted library allocation
page read and write
B30000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
13CF000
heap
page read and write
234C2EBA000
heap
page read and write
71C0000
heap
page read and write
32D0000
heap
page read and write
13B0000
heap
page read and write
210C7002000
trusted library allocation
page read and write
3141000
heap
page read and write
3861000
trusted library allocation
page read and write
3631000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
142B000
heap
page read and write
10C5000
heap
page read and write
14CD000
heap
page read and write
3863000
trusted library allocation
page read and write
5CB0000
remote allocation
page read and write
3141000
heap
page read and write
234C2EB8000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
14CD000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
210C5051000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
C46000
heap
page read and write
38AC000
trusted library allocation
page read and write
1B22C350000
heap
page read and write
3141000
heap
page read and write
10D7000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
398A000
trusted library allocation
page read and write
C3F000
heap
page read and write
3FA1000
trusted library allocation
page read and write
39D4000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
449E000
stack
page read and write
590A000
heap
page read and write
3760000
heap
page read and write
384C000
trusted library allocation
page read and write
3709000
trusted library allocation
page read and write
147D000
heap
page read and write
38D9000
trusted library allocation
page read and write
C34000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
6BAA0000
unkown
page write copy
7FF7AECD6000
unkown
page write copy
5930000
heap
page read and write
142B000
heap
page read and write
1700000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
36D0000
heap
page read and write
296BDB00000
heap
page read and write
10DB000
heap
page read and write
3988000
trusted library allocation
page read and write
3141000
heap
page read and write
36C0000
heap
page read and write
1B22DDA5000
heap
page read and write
2FC0000
trusted library allocation
page read and write
3020000
heap
page read and write
2F00000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
59E000
heap
page read and write
36D9000
trusted library allocation
page read and write
141C000
heap
page read and write
850000
unkown
page readonly
14CD000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C2EB7000
heap
page read and write
2ED0000
trusted library allocation
page read and write
3990000
heap
page read and write
46DC000
stack
page read and write
234C2E73000
heap
page read and write
39DF000
trusted library allocation
page read and write
CBF000
stack
page read and write
3982000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
13E0000
heap
page read and write
39D9000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
210C506A000
heap
page read and write
37F0000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
2430000
heap
page read and write
4D80000
heap
page read and write
EDE000
stack
page read and write
210C6FFC000
trusted library allocation
page read and write
3FA8000
trusted library allocation
page read and write
210C5021000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
1B22C120000
heap
page read and write
399D000
heap
page read and write
210C5021000
heap
page read and write
554000
heap
page read and write
3141000
heap
page read and write
3B74000
trusted library allocation
page read and write
234C2EA9000
heap
page read and write
554000
heap
page read and write
210C7003000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
1416000
heap
page read and write
1B4000
heap
page read and write
210C5066000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
554000
heap
page read and write
234C4AF9000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
210C5054000
heap
page read and write
3981000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
6CBF4000
unkown
page readonly
141B000
heap
page read and write
3672000
trusted library allocation
page read and write
5B000
unkown
page readonly
3141000
heap
page read and write
3210000
heap
page read and write
210C7002000
trusted library allocation
page read and write
210C5023000
heap
page read and write
13E1000
heap
page read and write
1274000
heap
page read and write
234C2E73000
heap
page read and write
6EDF000
stack
page read and write
147A000
heap
page read and write
1416000
heap
page read and write
210C7005000
trusted library allocation
page read and write
1429000
heap
page read and write
2D20000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
1CA000
unkown
page write copy
2CF2000
heap
page read and write
39A0000
heap
page read and write
1060000
heap
page read and write
3141000
heap
page read and write
234C2E9F000
heap
page read and write
17DE000
heap
page read and write
147A000
heap
page read and write
234C2E57000
heap
page read and write
234C2EBA000
heap
page read and write
764000
heap
page read and write
147A000
heap
page read and write
2E58000
trusted library allocation
page read and write
3030000
heap
page read and write
10AF000
heap
page read and write
3010000
heap
page read and write
393D000
trusted library allocation
page read and write
3597000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
13A0000
unkown
page read and write
36A1000
trusted library allocation
page read and write
10E3000
heap
page read and write
3990000
heap
page read and write
210C5051000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
234C4AF8000
trusted library allocation
page read and write
3200000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
359C000
trusted library allocation
page read and write
35A8000
trusted library allocation
page read and write
3020000
heap
page read and write
3490000
heap
page read and write
39B8000
trusted library allocation
page read and write
3B73000
trusted library allocation
page read and write
7A000
unkown
page read and write
14CD000
heap
page read and write
234C4AF3000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
3527000
heap
page read and write
10DB000
heap
page read and write
1509000
heap
page read and write
39F1000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
3460000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
74D000
stack
page read and write
210C7007000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
3620000
heap
page read and write
38AE000
trusted library allocation
page read and write
342E000
stack
page read and write
31C0000
heap
page read and write
14BB000
heap
page read and write
1385000
heap
page read and write
A5E000
stack
page read and write
1070000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
210C5051000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
210C504D000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
36D4000
trusted library allocation
page read and write
3987000
trusted library allocation
page read and write
3FA2000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
1469000
heap
page read and write
13DC000
heap
page read and write
1469000
heap
page read and write
3141000
heap
page read and write
3060000
heap
page read and write
13DB000
heap
page read and write
234C2EB8000
heap
page read and write
210C5006000
heap
page read and write
3707000
trusted library allocation
page read and write
3516000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
3A5F000
trusted library allocation
page read and write
13DB000
heap
page read and write
37E6000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2EA8000
heap
page read and write
210C6FF3000
trusted library allocation
page read and write
C34000
heap
page read and write
210C7006000
trusted library allocation
page read and write
359E000
trusted library allocation
page read and write
3141000
heap
page read and write
210C7006000
trusted library allocation
page read and write
1AB000
unkown
page readonly
1700000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
38BD000
trusted library allocation
page read and write
1B22C460000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
7F0000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
3141000
heap
page read and write
3708000
trusted library allocation
page read and write
3850000
heap
page read and write
210C6B00000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
3050000
heap
page read and write
38A3000
trusted library allocation
page read and write
3660000
heap
page read and write
210C5051000
heap
page read and write
1464000
heap
page read and write
36D3000
trusted library allocation
page read and write
650000
unkown
page readonly
210C7002000
trusted library allocation
page read and write
210C504F000
heap
page read and write
10B6000
heap
page read and write
3152000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
14CD000
heap
page read and write
5FA000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
2D96000
heap
page read and write
10A9000
heap
page read and write
36E1000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
E3B000
stack
page read and write
141B000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
5B1C000
stack
page read and write
13D8000
heap
page read and write
210C506A000
heap
page read and write
210C7005000
trusted library allocation
page read and write
36DB000
trusted library allocation
page read and write
210C504D000
heap
page read and write
2E52000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
3141000
heap
page read and write
210C5006000
heap
page read and write
6FB000
stack
page read and write
2FA0000
heap
page read and write
3AD4000
trusted library allocation
page read and write
3866000
trusted library allocation
page read and write
101E000
unkown
page readonly
1385000
heap
page read and write
3130000
heap
page read and write
234C2EA5000
heap
page read and write
210C5056000
heap
page read and write
DE0000
heap
page read and write
3878000
trusted library allocation
page read and write
147E000
heap
page read and write
1084000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
5CB0000
remote allocation
page read and write
14B5000
heap
page read and write
2FC0000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
F36000
heap
page read and write
36A3000
trusted library allocation
page read and write
37F0000
heap
page read and write
3141000
heap
page read and write
4D90000
heap
page read and write
234C2EB8000
heap
page read and write
760000
heap
page read and write
BB8000
heap
page read and write
2DA0000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
234C2EBE000
heap
page read and write
3290000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
39EA000
trusted library allocation
page read and write
160000
unkown
page readonly
13DB000
heap
page read and write
3141000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
14A4000
heap
page read and write
1469000
heap
page read and write
3A5A000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
3800000
heap
page read and write
765000
heap
page read and write
234C4EF4000
heap
page read and write
141B000
heap
page read and write
137F000
heap
page read and write
210C5006000
heap
page read and write
3513000
heap
page read and write
37F7000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
10FF000
heap
page read and write
2BD0000
heap
page read and write
C1E000
heap
page read and write
584F000
stack
page read and write
1340000
heap
page read and write
36ED000
trusted library allocation
page read and write
101E000
unkown
page readonly
5DD000
stack
page read and write
3989000
trusted library allocation
page read and write
3A4E000
heap
page read and write
210C7005000
trusted library allocation
page read and write
3360000
heap
page read and write
3847000
trusted library allocation
page read and write
3141000
heap
page read and write
210C7001000
trusted library allocation
page read and write
210C5006000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
3703000
trusted library allocation
page read and write
210C5051000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
5450000
heap
page read and write
34C000
stack
page read and write
3906000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
770000
heap
page read and write
210C506A000
heap
page read and write
36F0000
heap
page read and write
141B000
heap
page read and write
234C2E9F000
heap
page read and write
3036000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
3020000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
1050000
heap
page read and write
3141000
heap
page read and write
234C2EBF000
heap
page read and write
13DB000
heap
page read and write
36E7000
trusted library allocation
page read and write
3141000
heap
page read and write
210C6DF0000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
36E8000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
6410000
heap
page read and write
210C5021000
heap
page read and write
314B000
heap
page read and write
2DA0000
trusted library allocation
page read and write
8D0000
heap
page read and write
2780000
trusted library allocation
page read and write
660000
heap
page read and write
210C4F50000
heap
page read and write
3802000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
1465000
heap
page read and write
10DD000
heap
page read and write
37F2000
trusted library allocation
page read and write
2840000
heap
page read and write
3330000
heap
page read and write
6BD000
heap
page read and write
3050000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
141B000
heap
page read and write
389B000
trusted library allocation
page read and write
234C2EB8000
heap
page read and write
210C5021000
heap
page read and write
234C4750000
heap
page read and write
3141000
heap
page read and write
3EB0000
heap
page read and write
234C2EBA000
heap
page read and write
37B7000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
38DC000
trusted library allocation
page read and write
DB0000
heap
page read and write
3141000
heap
page read and write
2E4B000
trusted library allocation
page read and write
3141000
heap
page read and write
EF44F7F000
stack
page read and write
59A000
stack
page read and write
234C4AFD000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
720000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
12A3000
heap
page read and write
210C5006000
heap
page read and write
3864000
trusted library allocation
page read and write
210C5021000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
234C4AE0000
heap
page read and write
38E0000
heap
page read and write
3650000
heap
page read and write
14A4000
heap
page read and write
13CF000
heap
page read and write
13DE000
heap
page read and write
37F7000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
30EE000
stack
page read and write
14F3000
heap
page read and write
137E000
stack
page read and write
36A5000
trusted library allocation
page read and write
10DA000
heap
page read and write
210C7000000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
3141000
heap
page read and write
3B96000
trusted library allocation
page read and write
389F000
trusted library allocation
page read and write
3770000
heap
page read and write
13DB000
heap
page read and write
394D000
trusted library allocation
page read and write
3530000
heap
page read and write
3141000
heap
page read and write
36D0000
trusted library allocation
page read and write
210C504D000
heap
page read and write
3B7A000
trusted library allocation
page read and write
210C5051000
heap
page read and write
2A60000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
31C0000
heap
page read and write
13C7000
heap
page read and write
1CD000
unkown
page readonly
1730000
heap
page read and write
36E9000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
363C000
trusted library allocation
page read and write
70000
unkown
page readonly
1416000
heap
page read and write
3A5C000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
146B000
heap
page read and write
3310000
heap
page read and write
3040000
heap
page read and write
37B6000
trusted library allocation
page read and write
3350000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
6C1AB000
unkown
page read and write
36E3000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
210C7005000
trusted library allocation
page read and write
234C2EA0000
heap
page read and write
394D000
trusted library allocation
page read and write
3773000
trusted library allocation
page read and write
F7B000
stack
page read and write
3AD7000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
234C2E42000
heap
page read and write
2F90000
trusted library allocation
page read and write
39BB000
trusted library allocation
page read and write
3020000
heap
page read and write
3B9D000
trusted library allocation
page read and write
3270000
heap
page read and write
3B9B000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
2D20000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
37F2000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
150000
heap
page read and write
13DC000
heap
page read and write
674000
heap
page read and write
3141000
heap
page read and write
6C174000
unkown
page readonly
3B39000
trusted library allocation
page read and write
850000
unkown
page readonly
3860000
trusted library allocation
page read and write
3FAF000
heap
page read and write
3141000
heap
page read and write
210C7001000
trusted library allocation
page read and write
3640000
heap
page read and write
210C506A000
heap
page read and write
210C5006000
heap
page read and write
14BB000
heap
page read and write
3040000
heap
page read and write
234C2EBA000
heap
page read and write
3970000
heap
page read and write
1076000
heap
page read and write
3141000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
3A37000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
31F0000
heap
page read and write
37F0000
trusted library allocation
page read and write
36D7000
trusted library allocation
page read and write
1510000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
39FA000
trusted library allocation
page read and write
13E1000
heap
page read and write
210C5068000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
37F3000
trusted library allocation
page read and write
3141000
heap
page read and write
3070000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
6D1000
heap
page read and write
396A000
trusted library allocation
page read and write
210C5051000
heap
page read and write
4FEC000
stack
page read and write
8F0000
heap
page read and write
210C7004000
trusted library allocation
page read and write
11000
unkown
page execute read
210C7000000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
210C6920000
heap
page read and write
210C506A000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
210C504F000
heap
page read and write
B70000
heap
page read and write
2DA0000
trusted library allocation
page read and write
3141000
heap
page read and write
C1E000
heap
page read and write
234C2E73000
heap
page read and write
39DA000
trusted library allocation
page read and write
1E0000
heap
page read and write
36A8000
trusted library allocation
page read and write
3042000
heap
page read and write
2B30000
heap
page read and write
394E000
trusted library allocation
page read and write
210C504D000
heap
page read and write
140E000
heap
page read and write
296BDB80000
heap
page read and write
3673000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
BE8000
heap
page read and write
10CE000
heap
page read and write
38FE000
stack
page read and write
44BE000
stack
page read and write
10E8000
heap
page read and write
210C4FD8000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
14A4000
heap
page read and write
3141000
heap
page read and write
210C5006000
heap
page read and write
2EA0000
heap
page read and write
234C2E73000
heap
page read and write
234C2E83000
heap
page read and write
1395000
heap
page read and write
3141000
heap
page read and write
10C5000
heap
page read and write
3030000
heap
page read and write
F77F3FE000
stack
page read and write
36D2000
trusted library allocation
page read and write
6C1AD000
unkown
page readonly
3020000
trusted library allocation
page read and write
106E000
heap
page read and write
10E0000
heap
page read and write
C43000
heap
page read and write
3190000
heap
page read and write
1428000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
39EE000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
210C5021000
heap
page read and write
2ED0000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
7AC000
stack
page read and write
3B80000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
4FC000
stack
page read and write
10F9000
heap
page read and write
147A000
heap
page read and write
5DEF000
stack
page read and write
5350000
heap
page read and write
3B7F000
trusted library allocation
page read and write
37B7000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
210C4FF2000
heap
page read and write
3020000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
3141000
heap
page read and write
3C4B000
stack
page read and write
2ED0000
trusted library allocation
page read and write
14BB000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
39BB000
trusted library allocation
page read and write
350C000
trusted library allocation
page read and write
13CF000
heap
page read and write
210C7006000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
234C2C70000
heap
page read and write
210C700E000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
210C7004000
trusted library allocation
page read and write
36E3000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
84E000
stack
page read and write
210C6FFE000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
3A3D000
trusted library allocation
page read and write
A3E000
stack
page read and write
37B5000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
3890000
heap
page read and write
C34000
heap
page read and write
234C2E57000
heap
page read and write
3141000
heap
page read and write
161000
unkown
page execute read
1469000
heap
page read and write
6BD80000
unkown
page readonly
367C000
trusted library allocation
page read and write
30F0000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
1B4000
heap
page read and write
147E000
heap
page read and write
554000
heap
page read and write
761000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
38D6000
trusted library allocation
page read and write
210C5006000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
1404000
heap
page read and write
38A4000
trusted library allocation
page read and write
37BA000
heap
page read and write
1CA000
unkown
page write copy
54A4000
heap
page read and write
146F000
heap
page read and write
210C7001000
trusted library allocation
page read and write
146F000
heap
page read and write
31D0000
heap
page read and write
2E4E000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
147E000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
3B29000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
13C7000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
37B4000
trusted library allocation
page read and write
10E7000
heap
page read and write
5A4000
heap
page read and write
3B32000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
146D000
heap
page read and write
414D000
stack
page read and write
4F0000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
73B000
heap
page read and write
3947000
trusted library allocation
page read and write
5C3000
heap
page read and write
13DB000
heap
page read and write
210C506A000
heap
page read and write
3141000
heap
page read and write
2D20000
trusted library allocation
page read and write
398E000
trusted library allocation
page read and write
5A4000
heap
page read and write
C61000
heap
page read and write
1B22C137000
heap
page read and write
2DA0000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
6C17B000
unkown
page read and write
370A000
trusted library allocation
page read and write
400E000
stack
page read and write
210C7001000
trusted library allocation
page read and write
13DC000
heap
page read and write
5960000
heap
page read and write
500000
heap
page read and write
3141000
heap
page read and write
1424000
heap
page read and write
10EE000
heap
page read and write
210C7004000
trusted library allocation
page read and write
210C506F000
heap
page read and write
3141000
heap
page read and write
5A5000
heap
page read and write
3A3B000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
31B0000
heap
page read and write
3E80000
trusted library section
page read and write
210C6FFA000
trusted library allocation
page read and write
3141000
heap
page read and write
147D000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
14D6000
heap
page read and write
3141000
heap
page read and write
39D7000
trusted library allocation
page read and write
210C5021000
heap
page read and write
3962000
trusted library allocation
page read and write
234C2EB2000
heap
page read and write
210C504D000
heap
page read and write
3020000
trusted library allocation
page read and write
146B000
heap
page read and write
37E0000
heap
page read and write
210C5051000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
37B3000
trusted library allocation
page read and write
3EAA000
trusted library section
page read and write
3580000
heap
page read and write
45A0000
heap
page read and write
3141000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
30C0000
heap
page read and write
3774000
trusted library allocation
page read and write
10F2000
heap
page read and write
6D1000
heap
page read and write
210C504D000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
141B000
heap
page read and write
210C7005000
trusted library allocation
page read and write
EF44ACB000
stack
page read and write
13D6000
heap
page read and write
3CC4000
heap
page read and write
100C000
unkown
page read and write
234C4B04000
trusted library allocation
page read and write
5FA000
heap
page read and write
3508000
trusted library allocation
page read and write
33B3000
heap
page read and write
3330000
heap
page read and write
3880000
heap
page read and write
3B9A000
trusted library allocation
page read and write
6BE6F000
unkown
page read and write
1384000
heap
page read and write
37BA000
trusted library allocation
page read and write
210C5110000
heap
page read and write
210C7001000
trusted library allocation
page read and write
36E7000
trusted library allocation
page read and write
210C5021000
heap
page read and write
14CD000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
1364000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
3141000
heap
page read and write
363A000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
2FA0000
heap
page read and write
3020000
trusted library allocation
page read and write
31F0000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
630000
heap
page read and write
1B22C153000
heap
page read and write
1106000
heap
page read and write
5A4000
heap
page read and write
36A0000
heap
page read and write
10F8000
heap
page read and write
234C2E75000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
3867000
trusted library allocation
page read and write
3707000
trusted library allocation
page read and write
58D000
stack
page read and write
13CF000
heap
page read and write
14B6000
heap
page read and write
3FA0000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
3640000
heap
page read and write
13C7000
heap
page read and write
10CA000
heap
page read and write
38A5000
trusted library allocation
page read and write
39EC000
trusted library allocation
page read and write
D2E32FF000
stack
page read and write
210C5051000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
147D000
heap
page read and write
3010000
heap
page read and write
147A000
heap
page read and write
210C5023000
heap
page read and write
BF6000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
12C1000
heap
page read and write
10D7000
heap
page read and write
28299B7F000
heap
page read and write
3380000
heap
page read and write
BD3000
heap
page read and write
234C2EA5000
heap
page read and write
1274000
heap
page read and write
210C504F000
heap
page read and write
146F000
heap
page read and write
2F00000
heap
page read and write
3A5E000
trusted library allocation
page read and write
1418000
heap
page read and write
3965000
trusted library allocation
page read and write
142B000
heap
page read and write
54E000
stack
page read and write
3B93000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
210C6FF8000
trusted library allocation
page read and write
536000
heap
page read and write
210C7003000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
5930000
heap
page read and write
35A3000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
1480000
heap
page read and write
39E0000
heap
page read and write
14BB000
heap
page read and write
6B80000
heap
page read and write
13DB000
heap
page read and write
210C6FF0000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
210C5070000
heap
page read and write
234C2EB9000
heap
page read and write
3141000
heap
page read and write
37B8000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
13CF000
heap
page read and write
14B9000
heap
page read and write
210C505B000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
14BA000
heap
page read and write
3141000
heap
page read and write
13DC000
heap
page read and write
210C5006000
heap
page read and write
3141000
heap
page read and write
210C506A000
heap
page read and write
234C2EBD000
heap
page read and write
12B2000
heap
page read and write
39B2000
trusted library allocation
page read and write
1384000
heap
page read and write
459F000
stack
page read and write
3B93000
trusted library allocation
page read and write
142B000
heap
page read and write
314C000
heap
page read and write
3580000
heap
page read and write
14BB000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
3141000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
37B2000
trusted library allocation
page read and write
3480000
trusted library allocation
page read and write
210C5170000
heap
page read and write
1720000
heap
page read and write
149B000
heap
page read and write
13CF000
heap
page read and write
161000
unkown
page execute read
3930000
heap
page read and write
3840000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
234C2EB8000
heap
page read and write
10B0000
heap
page read and write
13DB000
heap
page read and write
7FF7AECE0000
unkown
page readonly
142B000
heap
page read and write
10E3000
heap
page read and write
1478000
heap
page read and write
C25000
heap
page read and write
1F8CD690000
heap
page read and write
3ED0000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
13E1000
heap
page read and write
9C000
stack
page read and write
146F000
heap
page read and write
5A1E000
stack
page read and write
3141000
heap
page read and write
36DC000
trusted library allocation
page read and write
13CF000
heap
page read and write
3800000
heap
page read and write
3240000
heap
page read and write
3310000
heap
page read and write
BF4000
heap
page read and write
234C2EBA000
heap
page read and write
234C2E73000
heap
page read and write
234C2EB7000
heap
page read and write
13CF000
heap
page read and write
14B8000
heap
page read and write
1320000
heap
page read and write
37BB000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
13DC000
heap
page read and write
12FB000
stack
page read and write
10E7000
heap
page read and write
210C5051000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
367B000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
13DB000
heap
page read and write
1AB000
unkown
page readonly
554000
heap
page read and write
210C504D000
heap
page read and write
234C2EB8000
heap
page read and write
417E000
stack
page read and write
234C2E75000
heap
page read and write
32D0000
heap
page read and write
554000
heap
page read and write
210C7006000
trusted library allocation
page read and write
13CB000
heap
page read and write
3B97000
trusted library allocation
page read and write
1F8CDB30000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
1CA000
unkown
page read and write
13DB000
heap
page read and write
210C700F000
trusted library allocation
page read and write
1385000
heap
page read and write
3140000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
3141000
heap
page read and write
3876000
trusted library allocation
page read and write
110F000
heap
page read and write
234C2EA9000
heap
page read and write
210C7004000
trusted library allocation
page read and write
1AB000
unkown
page readonly
1053000
heap
page read and write
4D70000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
210C5021000
heap
page read and write
1B22C300000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
210C506F000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
3890000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
160000
unkown
page readonly
37E5000
trusted library allocation
page read and write
3594000
trusted library allocation
page read and write
13C7000
heap
page read and write
3A41000
heap
page read and write
210C6CB0000
heap
page read and write
1B22C130000
heap
page read and write
234C2E9F000
heap
page read and write
38D5000
trusted library allocation
page read and write
390E000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
3010000
heap
page read and write
1276000
heap
page read and write
13CF000
heap
page read and write
3895000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
3930000
heap
page read and write
210C5065000
heap
page read and write
234C2EA5000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
3141000
heap
page read and write
39BE000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
234C2EBF000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
210C5175000
heap
page read and write
6C17D000
unkown
page readonly
234C4AFB000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
3967000
trusted library allocation
page read and write
2CB0000
heap
page read and write
37FA000
trusted library allocation
page read and write
BE0000
heap
page read and write
29E5000
stack
page read and write
1104000
heap
page read and write
3B9A000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
5128000
heap
page read and write
234C2EBD000
heap
page read and write
27B0000
heap
page read and write
36A2000
trusted library allocation
page read and write
13EA000
heap
page read and write
3B71000
trusted library allocation
page read and write
1064000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
58F4000
heap
page read and write
141B000
heap
page read and write
3680000
heap
page read and write
147A000
heap
page read and write
6E4000
heap
page read and write
14CD000
heap
page read and write
3141000
heap
page read and write
858000
unkown
page read and write
36E6000
trusted library allocation
page read and write
10EF000
heap
page read and write
13CF000
heap
page read and write
141B000
heap
page read and write
210C7006000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
3470000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
36D7000
trusted library allocation
page read and write
58DF000
stack
page read and write
234C2DF0000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
650000
unkown
page readonly
370F000
trusted library allocation
page read and write
3690000
heap
page read and write
3140000
heap
page read and write
3141000
heap
page read and write
234C2E15000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
3849000
trusted library allocation
page read and write
3640000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
210C5016000
heap
page read and write
3A58000
trusted library allocation
page read and write
13E0000
heap
page read and write
3260000
heap
page read and write
3141000
heap
page read and write
3865000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
C05000
heap
page read and write
39B4000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
6F1000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
2E1E000
stack
page read and write
234C2E9F000
heap
page read and write
13A4000
heap
page read and write
39F4000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
210C504D000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
19E000
stack
page read and write
13C7000
heap
page read and write
234C2EA5000
heap
page read and write
1C0000
heap
page read and write
3141000
heap
page read and write
2FC0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
3141000
heap
page read and write
210C5065000
heap
page read and write
10C5000
heap
page read and write
3CBA000
stack
page read and write
3B9E000
trusted library allocation
page read and write
9AD000
unkown
page readonly
3780000
heap
page read and write
5B7E000
stack
page read and write
2D20000
trusted library allocation
page read and write
6F2E000
stack
page read and write
352C000
heap
page read and write
2A30000
heap
page read and write
14BB000
heap
page read and write
210C7001000
trusted library allocation
page read and write
6EE000
heap
page read and write
1F8CD7E5000
heap
page read and write
6F1000
heap
page read and write
147A000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
13C0000
heap
page read and write
234C2E9F000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
3141000
heap
page read and write
210C5065000
heap
page read and write
210C7003000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
6CC00000
unkown
page readonly
1002000
unkown
page execute read
36AA000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4780000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
234C2D70000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
161000
unkown
page execute read
234C2EBA000
heap
page read and write
3141000
heap
page read and write
3B70000
trusted library allocation
page read and write
5A0000
heap
page read and write
1CA000
unkown
page write copy
234C4B04000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
539D000
stack
page read and write
234C2EBC000
heap
page read and write
1449000
heap
page read and write
36EB000
trusted library allocation
page read and write
210C5065000
heap
page read and write
36DE000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
3946000
trusted library allocation
page read and write
3141000
heap
page read and write
3946000
trusted library allocation
page read and write
85A000
unkown
page readonly
210C506A000
heap
page read and write
3141000
heap
page read and write
3A59000
trusted library allocation
page read and write
6BA000
unkown
page write copy
396D000
trusted library allocation
page read and write
13DB000
heap
page read and write
2F8F000
stack
page read and write
3867000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
6D0000
heap
page read and write
5B000
unkown
page readonly
37F3000
trusted library allocation
page read and write
296BDB89000
heap
page read and write
37FA000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
C3C000
heap
page read and write
6E4000
heap
page read and write
C3E000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
210C5021000
heap
page read and write
39E0000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
6E6000
heap
page read and write
2FF0000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
234C4B0A000
trusted library allocation
page read and write
14D6000
heap
page read and write
234C2E75000
heap
page read and write
3141000
heap
page read and write
3740000
heap
page read and write
2D20000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
14A6000
heap
page read and write
147D000
heap
page read and write
234C2EBA000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
210C5051000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
5EE000
heap
page read and write
14B6000
heap
page read and write
5A4000
heap
page read and write
160000
unkown
page readonly
234C2E9F000
heap
page read and write
1478000
heap
page read and write
39B7000
trusted library allocation
page read and write
3270000
heap
page read and write
37B3000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
210C5006000
heap
page read and write
234C2E57000
heap
page read and write
13DC000
heap
page read and write
210C7001000
trusted library allocation
page read and write
7A000
unkown
page readonly
1700000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
3270000
heap
page read and write
3370000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
38D4000
trusted library allocation
page read and write
38D8000
trusted library allocation
page read and write
698000
heap
page read and write
14CD000
heap
page read and write
39E8000
trusted library allocation
page read and write
35D0000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
36D0000
heap
page read and write
210C506A000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
3141000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
3220000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
1348000
heap
page read and write
C38000
heap
page read and write
2FA0000
heap
page read and write
14CD000
heap
page read and write
350F000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
10F6000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
3620000
heap
page read and write
3141000
heap
page read and write
6D4000
heap
page read and write
39B0000
trusted library allocation
page read and write
1468000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
14BB000
heap
page read and write
3141000
heap
page read and write
3B12000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
6ED000
heap
page read and write
33B0000
heap
page read and write
1469000
heap
page read and write
13C7000
heap
page read and write
1B4000
heap
page read and write
1B22DDA0000
heap
page read and write
377C000
trusted library allocation
page read and write
234C4B0C000
trusted library allocation
page read and write
210C5006000
heap
page read and write
3141000
heap
page read and write
234C4AF0000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
234C2E20000
heap
page read and write
14BB000
heap
page read and write
694000
heap
page read and write
39FC000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
37E1000
trusted library allocation
page read and write
3141000
heap
page read and write
13FA000
heap
page read and write
14B8000
heap
page read and write
3AD6000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
6B9F0000
unkown
page readonly
3B98000
trusted library allocation
page read and write
55D0000
heap
page read and write
3518000
heap
page read and write
3A55000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
210C5051000
heap
page read and write
2DA0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
1429000
heap
page read and write
3598000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
386D000
trusted library allocation
page read and write
2EF4000
heap
page read and write
3141000
heap
page read and write
14B0000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
1430000
heap
page read and write
210C7006000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
2E4D000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
39DC000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
3700000
trusted library allocation
page read and write
33D0000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
234C2EA0000
heap
page read and write
2CF8000
heap
page read and write
BFE000
heap
page read and write
234C2E73000
heap
page read and write
6E3000
heap
page read and write
36D8000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
210C504D000
heap
page read and write
141B000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
146F000
heap
page read and write
3450000
heap
page read and write
234C2EB8000
heap
page read and write
147D000
heap
page read and write
837000
heap
page read and write
210C7003000
trusted library allocation
page read and write
1F8CD790000
heap
page read and write
72D0000
trusted library allocation
page read and write
1CD000
unkown
page readonly
7D0000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
13C7000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
147F000
heap
page read and write
1700000
heap
page read and write
1B4000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
4A5F000
stack
page read and write
3220000
heap
page read and write
36DE000
trusted library allocation
page read and write
3A54000
trusted library allocation
page read and write
37E6000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
3320000
heap
page read and write
1038000
heap
page read and write
3300000
heap
page read and write
4BDC000
stack
page read and write
210C5051000
heap
page read and write
A60000
heap
page read and write
38E0000
heap
page read and write
39E5000
trusted library allocation
page read and write
210C506A000
heap
page read and write
234C2E57000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
3982000
trusted library allocation
page read and write
14D6000
heap
page read and write
387B000
trusted library allocation
page read and write
13CF000
heap
page read and write
234C2EB8000
heap
page read and write
459E000
stack
page read and write
37A0000
heap
page read and write
3909000
trusted library allocation
page read and write
5CEE000
stack
page read and write
3B50000
heap
page read and write
147D000
heap
page read and write
14BB000
heap
page read and write
234C2E73000
heap
page read and write
3190000
heap
page read and write
3460000
heap
page read and write
13C4000
heap
page read and write
93A000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
1429000
heap
page read and write
234C2E67000
heap
page read and write
146F000
heap
page read and write
3B18000
heap
page read and write
147E000
heap
page read and write
234C2EA5000
heap
page read and write
3160000
heap
page read and write
3C10000
trusted library allocation
page read and write
FE0000
heap
page read and write
1414000
heap
page read and write
C25000
heap
page read and write
3905000
trusted library allocation
page read and write
658000
heap
page read and write
39D0000
heap
page read and write
A7D000
stack
page read and write
4D0C000
stack
page read and write
39D5000
trusted library allocation
page read and write
3B36000
trusted library allocation
page read and write
940000
unkown
page readonly
234C4B04000
trusted library allocation
page read and write
149D000
heap
page read and write
13DC000
heap
page read and write
846000
heap
page read and write
39A0000
heap
page read and write
32F0000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
37EE000
trusted library allocation
page read and write
3920000
heap
page read and write
1FF000
stack
page read and write
3141000
heap
page read and write
1338000
stack
page read and write
234C4AFE000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
10DB000
heap
page read and write
210C506A000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
37EF000
trusted library allocation
page read and write
13DC000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
141B000
heap
page read and write
234C2EB8000
heap
page read and write
3B3B000
trusted library allocation
page read and write
5A4000
heap
page read and write
110F000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
14CD000
heap
page read and write
3280000
heap
page read and write
3ADF000
trusted library allocation
page read and write
234C2EBD000
heap
page read and write
3690000
heap
page read and write
592A000
heap
page read and write
2E40000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
438E000
stack
page read and write
14B8000
heap
page read and write
33E0000
heap
page read and write
2DA0000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
F30000
heap
page read and write
394B000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
14B6000
heap
page read and write
39BD000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
390C000
trusted library allocation
page read and write
210C6FF7000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
210C506A000
heap
page read and write
234C2EB8000
heap
page read and write
3B79000
trusted library allocation
page read and write
30EC000
stack
page read and write
396F000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
1F8CD770000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
210C506A000
heap
page read and write
50E000
stack
page read and write
39D0000
heap
page read and write
394C000
trusted library allocation
page read and write
3060000
heap
page read and write
3638000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
147E000
heap
page read and write
3812000
trusted library allocation
page read and write
6ED000
heap
page read and write
13D2000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
36E9000
trusted library allocation
page read and write
10F4000
heap
page read and write
1404000
heap
page read and write
1416000
heap
page read and write
1420000
heap
page read and write
1429000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
210C5065000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
72D0000
remote allocation
page read and write
4C20000
heap
page read and write
3230000
heap
page read and write
2FC0000
trusted library allocation
page read and write
3931000
trusted library allocation
page read and write
210C5056000
heap
page read and write
210C7004000
trusted library allocation
page read and write
36C0000
heap
page read and write
210C506F000
heap
page read and write
38A2000
trusted library allocation
page read and write
325E000
heap
page read and write
36EC000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
814000
heap
page read and write
14A6000
heap
page read and write
6CF0000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
1471000
heap
page read and write
FF0000
heap
page read and write
5A4000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
10E1000
heap
page read and write
37B5000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
210C504D000
heap
page read and write
234C2E57000
heap
page read and write
7FF7AECA4000
unkown
page readonly
1B4000
heap
page read and write
37F6000
trusted library allocation
page read and write
1418000
heap
page read and write
146F000
heap
page read and write
113E000
stack
page read and write
14CD000
heap
page read and write
3981000
trusted library allocation
page read and write
12A3000
heap
page read and write
210C7002000
trusted library allocation
page read and write
6CBE0000
unkown
page readonly
210C5021000
heap
page read and write
13CB000
heap
page read and write
3640000
heap
page read and write
2FC0000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
210C5021000
heap
page read and write
3983000
trusted library allocation
page read and write
3141000
heap
page read and write
52FC000
stack
page read and write
1F0000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
A40000
heap
page read and write
3660000
trusted library allocation
page read and write
3042000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
13CF000
heap
page read and write
3141000
heap
page read and write
18E000
stack
page read and write
38C0000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
A80000
heap
page read and write
210C7002000
trusted library allocation
page read and write
3810000
trusted library allocation
page read and write
147A000
heap
page read and write
343E000
stack
page read and write
3550000
heap
page read and write
9C0000
heap
page read and write
1090000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
210C5051000
heap
page read and write
37F9000
trusted library allocation
page read and write
10F7000
heap
page read and write
234C2E57000
heap
page read and write
36D5000
trusted library allocation
page read and write
1CF000
stack
page read and write
3B10000
heap
page read and write
3141000
heap
page read and write
234C2E75000
heap
page read and write
2DA0000
trusted library allocation
page read and write
10A5000
heap
page read and write
3141000
heap
page read and write
234C2E75000
heap
page read and write
3595000
trusted library allocation
page read and write
6CA000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
3960000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
161000
unkown
page execute read
29A0000
heap
page read and write
6BD81000
unkown
page execute read
234C4B07000
trusted library allocation
page read and write
149C000
heap
page read and write
210C5021000
heap
page read and write
39F2000
trusted library allocation
page read and write
13DE000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
3330000
heap
page read and write
13C7000
heap
page read and write
28299B25000
heap
page read and write
39ED000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
EF44B4E000
stack
page read and write
13DB000
heap
page read and write
234C2E57000
heap
page read and write
3779000
trusted library allocation
page read and write
2600000
heap
page read and write
35E0000
heap
page read and write
3610000
heap
page read and write
10D4000
heap
page read and write
3868000
trusted library allocation
page read and write
37FF000
trusted library allocation
page read and write
13DB000
heap
page read and write
3010000
heap
page read and write
234C2EB7000
heap
page read and write
5520000
direct allocation
page read and write
1409000
heap
page read and write
3866000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
3B92000
trusted library allocation
page read and write
146F000
heap
page read and write
2ED0000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
398F000
trusted library allocation
page read and write
53A0000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
2E40000
heap
page read and write
210C504F000
heap
page read and write
37C0000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
6BAAB000
unkown
page readonly
10CF000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
13DB000
heap
page read and write
846000
heap
page read and write
3350000
heap
page read and write
2F00000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
3877000
trusted library allocation
page read and write
3B76000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
2FD0000
heap
page read and write
3AC0000
heap
page read and write
3FA3000
trusted library allocation
page read and write
DD000
stack
page read and write
210C7000000
trusted library allocation
page read and write
210C5021000
heap
page read and write
2D02000
heap
page read and write
4F8E000
stack
page read and write
3920000
heap
page read and write
234C2EBD000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
1AB000
unkown
page readonly
315F000
heap
page read and write
2FAD000
heap
page read and write
13E0000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
210C5021000
heap
page read and write
2CB0000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
101E000
unkown
page readonly
1002000
unkown
page execute read
F3B000
stack
page read and write
210C7003000
trusted library allocation
page read and write
3EFF000
stack
page read and write
381A000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
27EF000
stack
page read and write
234C2DF4000
trusted library allocation
page read and write
6BD000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
3164000
heap
page read and write
3861000
trusted library allocation
page read and write
135E000
stack
page read and write
2D20000
trusted library allocation
page read and write
146F000
heap
page read and write
210C5067000
heap
page read and write
39B9000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
3120000
heap
page read and write
234C2EA0000
heap
page read and write
3200000
heap
page read and write
3141000
heap
page read and write
377B000
trusted library allocation
page read and write
3772000
trusted library allocation
page read and write
3610000
heap
page read and write
13E0000
trusted library allocation
page read and write
6C9000
heap
page read and write
540E000
stack
page read and write
398C000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
398A000
trusted library allocation
page read and write
105D000
heap
page read and write
13DC000
heap
page read and write
234C2EB8000
heap
page read and write
1469000
heap
page read and write
141B000
heap
page read and write
3A4D000
heap
page read and write
3943000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
3141000
heap
page read and write
1000000
unkown
page readonly
3B98000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
147A000
heap
page read and write
3790000
heap
page read and write
210C504F000
heap
page read and write
2F00000
trusted library allocation
page read and write
3509000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
1469000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
234C2E67000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
3B78000
trusted library allocation
page read and write
3020000
heap
page read and write
53C0000
heap
page read and write
210C5056000
heap
page read and write
234C2E73000
heap
page read and write
210C7004000
trusted library allocation
page read and write
210C5021000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
50FC000
stack
page read and write
234C4AF6000
trusted library allocation
page read and write
3814000
trusted library allocation
page read and write
3AD3000
trusted library allocation
page read and write
34BE000
stack
page read and write
427D000
stack
page read and write
5914000
heap
page read and write
3141000
heap
page read and write
147A000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
3250000
heap
page read and write
234C2E9F000
heap
page read and write
3B99000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
3600000
heap
page read and write
768000
heap
page read and write
234C2E9F000
heap
page read and write
31A1D9B000
stack
page read and write
143E000
heap
page read and write
210C7000000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
36D4000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
36AC000
heap
page read and write
3949000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
101E000
unkown
page readonly
210C5051000
heap
page read and write
10C3000
heap
page read and write
234C2EB8000
heap
page read and write
3ADA000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
6B9E1000
unkown
page readonly
10D4000
heap
page read and write
234C2EA5000
heap
page read and write
210C7005000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
88E000
stack
page read and write
36E2000
trusted library allocation
page read and write
3320000
heap
page read and write
73E000
heap
page read and write
3844000
trusted library allocation
page read and write
941000
unkown
page execute read
234C2EA5000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
651000
unkown
page execute read
234C4B0F000
trusted library allocation
page read and write
13D6000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
234C4AFC000
trusted library allocation
page read and write
5480000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3141000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
31A21FE000
stack
page read and write
1468000
heap
page read and write
58A000
stack
page read and write
2FC0000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
1480000
heap
page read and write
2FD0000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
1415000
heap
page read and write
7FF7AECD6000
unkown
page read and write
5C7E000
stack
page read and write
A10000
heap
page read and write
234C2E75000
heap
page read and write
1B4000
heap
page read and write
6CA000
heap
page read and write
1700000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
3637000
trusted library allocation
page read and write
1478000
heap
page read and write
14B6000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
3141000
heap
page read and write
3370000
heap
page read and write
39B5000
trusted library allocation
page read and write
3141000
heap
page read and write
32E0000
heap
page read and write
147E000
heap
page read and write
210C7003000
trusted library allocation
page read and write
210C4F30000
heap
page read and write
210C6FE0000
heap
page read and write
210C5068000
heap
page read and write
4CEE000
stack
page read and write
210C7000000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
88E000
stack
page read and write
234C2EBA000
heap
page read and write
38A0000
trusted library allocation
page read and write
708E000
stack
page read and write
210C6FFB000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
30F0000
heap
page read and write
234C2EB8000
heap
page read and write
1705000
heap
page read and write
3969000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
1AB000
unkown
page readonly
210C7006000
trusted library allocation
page read and write
28299AF0000
heap
page read and write
37BB000
trusted library allocation
page read and write
234C4AF7000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
234C4910000
heap
page read and write
13F2000
heap
page read and write
36DD000
trusted library allocation
page read and write
39BC000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
71000
unkown
page execute read
210C6FFB000
trusted library allocation
page read and write
210C5051000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
5A4000
heap
page read and write
1406000
heap
page read and write
3141000
heap
page read and write
2FC0000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
5A5000
heap
page read and write
7FF7AEC20000
unkown
page readonly
2ED0000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
381F000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
210C5066000
heap
page read and write
846000
heap
page read and write
14D6000
heap
page read and write
3873000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
1291000
heap
page read and write
39A0000
heap
page read and write
296BDB30000
heap
page read and write
210C7004000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
367F000
trusted library allocation
page read and write
147A000
heap
page read and write
210C7002000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
9AA000
unkown
page write copy
13DB000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
C4A000
heap
page read and write
39B5000
trusted library allocation
page read and write
3B60000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
13FA000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
1406000
heap
page read and write
5907000
heap
page read and write
3141000
heap
page read and write
140000
heap
page read and write
12BA000
heap
page read and write
1416000
heap
page read and write
3B72000
trusted library allocation
page read and write
210C5051000
heap
page read and write
3141000
heap
page read and write
2DA0000
trusted library allocation
page read and write
314E000
heap
page read and write
234C2EA0000
heap
page read and write
210C7001000
trusted library allocation
page read and write
210C6FF1000
trusted library allocation
page read and write
3360000
heap
page read and write
210C5051000
heap
page read and write
14CD000
heap
page read and write
2FF0000
trusted library allocation
page read and write
36F0000
heap
page read and write
37EA000
trusted library allocation
page read and write
3B24000
trusted library allocation
page read and write
3141000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
3864000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
3933000
trusted library allocation
page read and write
1274000
heap
page read and write
396B000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
13E0000
heap
page read and write
3141000
heap
page read and write
210C7006000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
3B23000
trusted library allocation
page read and write
10DD000
heap
page read and write
234C2EB9000
heap
page read and write
38B3000
trusted library allocation
page read and write
1D0000
heap
page read and write
13C7000
heap
page read and write
210C5051000
heap
page read and write
234C2EB8000
heap
page read and write
3240000
heap
page read and write
14CD000
heap
page read and write
234C2EA5000
heap
page read and write
234C2E75000
heap
page read and write
39F0000
trusted library allocation
page read and write
3300000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
2BF0000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
764000
heap
page read and write
81E000
heap
page read and write
1437000
heap
page read and write
210C7002000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
A80000
heap
page read and write
1469000
heap
page read and write
1000000
unkown
page readonly
234C4B04000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
3690000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
3141000
heap
page read and write
38D3000
trusted library allocation
page read and write
39BF000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
3141000
heap
page read and write
1CD000
unkown
page readonly
373F000
stack
page read and write
234C4B02000
trusted library allocation
page read and write
32F0000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
3141000
heap
page read and write
210C7005000
trusted library allocation
page read and write
3A53000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
3A4A000
heap
page read and write
554000
heap
page read and write
1100000
heap
page read and write
3141000
heap
page read and write
2EB0000
trusted library allocation
page read and write
210C5021000
heap
page read and write
37EB000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
6B9E0000
unkown
page read and write
210C7002000
trusted library allocation
page read and write
210C5006000
heap
page read and write
10A0000
trusted library allocation
page read and write
13DB000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
12FA000
stack
page read and write
3676000
trusted library allocation
page read and write
10F7000
heap
page read and write
13DB000
heap
page read and write
14D6000
heap
page read and write
7A000
unkown
page readonly
37F2000
trusted library allocation
page read and write
3524000
heap
page read and write
B296FFE000
stack
page read and write
10CF000
heap
page read and write
510000
heap
page read and write
210C7005000
trusted library allocation
page read and write
210C504D000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2E75000
heap
page read and write
98B000
unkown
page readonly
1700000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
3850000
heap
page read and write
126E000
heap
page read and write
384F000
trusted library allocation
page read and write
770000
heap
page read and write
78D000
stack
page read and write
210C5051000
heap
page read and write
160000
unkown
page readonly
33E0000
heap
page read and write
6C180000
unkown
page readonly
6C4000
heap
page read and write
1030000
heap
page read and write
1291000
heap
page read and write
AD0000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
38B2000
trusted library allocation
page read and write
6CE000
stack
page read and write
3141000
heap
page read and write
234C2E9F000
heap
page read and write
3505000
trusted library allocation
page read and write
98E000
stack
page read and write
234C4B03000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
386B000
trusted library allocation
page read and write
DEB000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
210C5006000
heap
page read and write
6BA000
unkown
page read and write
38AA000
trusted library allocation
page read and write
2CD0000
heap
page read and write
1481000
heap
page read and write
C50000
heap
page read and write
2E5D000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
10FE000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
137B000
heap
page read and write
3042000
heap
page read and write
82F000
heap
page read and write
72D0000
direct allocation
page read and write
30E0000
heap
page read and write
210C5051000
heap
page read and write
2F00000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
386A000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
10BE000
heap
page read and write
14BB000
heap
page read and write
210C5051000
heap
page read and write
14B4000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
38B4000
trusted library allocation
page read and write
210C7007000
trusted library allocation
page read and write
210C7000000
trusted library allocation
page read and write
3930000
heap
page read and write
3141000
heap
page read and write
3845000
trusted library allocation
page read and write
6C181000
unkown
page execute read
1B22C160000
heap
page read and write
10DA000
heap
page read and write
32F0000
heap
page read and write
3530000
direct allocation
page read and write
394B000
trusted library allocation
page read and write
1435000
heap
page read and write
3141000
heap
page read and write
3340000
heap
page read and write
6B9F1000
unkown
page execute read
2E57000
trusted library allocation
page read and write
33BE000
stack
page read and write
5A4000
heap
page read and write
6BA9F000
unkown
page read and write
234C4AFF000
trusted library allocation
page read and write
449C000
stack
page read and write
28299AA0000
heap
page read and write
2FE0000
heap
page read and write
3B9C000
trusted library allocation
page read and write
1415000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
3B31000
trusted library allocation
page read and write
3778000
trusted library allocation
page read and write
234C4B06000
trusted library allocation
page read and write
3941000
trusted library allocation
page read and write
CD0000
heap
page read and write
2E4C000
trusted library allocation
page read and write
3141000
heap
page read and write
1B4000
heap
page read and write
2EB0000
trusted library allocation
page read and write
149E000
heap
page read and write
495B000
stack
page read and write
210C7003000
trusted library allocation
page read and write
3141000
heap
page read and write
36B0000
heap
page read and write
38B6000
trusted library allocation
page read and write
39C0000
heap
page read and write
38C0000
heap
page read and write
13A0000
heap
page read and write
3360000
heap
page read and write
3141000
heap
page read and write
1469000
heap
page read and write
352A000
heap
page read and write
234C4B00000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
14A6000
heap
page read and write
1F8CD7C0000
heap
page read and write
3200000
heap
page read and write
210C7002000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
36DB000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
3100000
heap
page read and write
13E4000
heap
page read and write
13B5000
heap
page read and write
3896000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
1469000
heap
page read and write
36DC000
trusted library allocation
page read and write
6A0000
heap
page read and write
3141000
heap
page read and write
5ED000
stack
page read and write
3020000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
14B9000
heap
page read and write
3240000
heap
page read and write
2FA0000
heap
page read and write
3B2F000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
234C2EA0000
heap
page read and write
210C5006000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
58F4000
heap
page read and write
2FF0000
trusted library allocation
page read and write
3310000
heap
page read and write
3FA5000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
36F0000
heap
page read and write
13DC000
heap
page read and write
234C2E73000
heap
page read and write
554000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
296BDAE0000
heap
page read and write
3141000
heap
page read and write
7FF7AECA4000
unkown
page readonly
3869000
trusted library allocation
page read and write
3141000
heap
page read and write
37E4000
trusted library allocation
page read and write
398E000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
6ED000
heap
page read and write
3020000
trusted library allocation
page read and write
5B0000
heap
page read and write
146F000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
6D4000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
5E00000
direct allocation
page read and write
234C2EBD000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
13C7000
heap
page read and write
72D0000
remote allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
1B4000
heap
page read and write
210C7000000
trusted library allocation
page read and write
1074000
heap
page read and write
3701000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
210C504E000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
14B8000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
3410000
heap
page read and write
210C504D000
heap
page read and write
2FDF000
stack
page read and write
9C000
stack
page read and write
2B40000
heap
page read and write
13CC000
heap
page read and write
234C2EA9000
heap
page read and write
3141000
heap
page read and write
31B0000
heap
page read and write
210C504D000
heap
page read and write
14A9000
heap
page read and write
210C7001000
trusted library allocation
page read and write
324A000
heap
page read and write
3936000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
651000
unkown
page execute read
210C504D000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
769000
heap
page read and write
3B26000
trusted library allocation
page read and write
38A8000
trusted library allocation
page read and write
147A000
heap
page read and write
BFB000
heap
page read and write
3811000
trusted library allocation
page read and write
2EA0000
heap
page read and write
3141000
heap
page read and write
6D6000
heap
page read and write
1436000
heap
page read and write
3290000
heap
page read and write
3875000
trusted library allocation
page read and write
2E5A000
trusted library allocation
page read and write
234C4B05000
trusted library allocation
page read and write
3340000
heap
page read and write
5A4000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
14E0000
heap
page read and write
234C2EBA000
heap
page read and write
36A9000
trusted library allocation
page read and write
315F000
heap
page read and write
38BB000
trusted library allocation
page read and write
210C504D000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
37BA000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
6C19F000
unkown
page readonly
3141000
heap
page read and write
3990000
heap
page read and write
210C7002000
trusted library allocation
page read and write
3141000
heap
page read and write
37FD000
trusted library allocation
page read and write
1CD000
unkown
page readonly
37F1000
trusted library allocation
page read and write
134E000
stack
page read and write
32F0000
heap
page read and write
13CF000
heap
page read and write
10C3000
heap
page read and write
10C1000
heap
page read and write
B40000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
14BA000
heap
page read and write
3020000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
600000
heap
page read and write
234C2EBA000
heap
page read and write
9C000
stack
page read and write
390F000
trusted library allocation
page read and write
1710000
heap
page read and write
13C7000
heap
page read and write
3A52000
trusted library allocation
page read and write
210C506A000
heap
page read and write
13DC000
heap
page read and write
2E44000
trusted library allocation
page read and write
3862000
trusted library allocation
page read and write
1472000
heap
page read and write
3A3F000
trusted library allocation
page read and write
50E000
stack
page read and write
146F000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
D70F12B000
stack
page read and write
B296EFB000
stack
page read and write
3630000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
10E7000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
419F000
stack
page read and write
729000
heap
page read and write
3830000
heap
page read and write
160000
unkown
page readonly
210C6FFF000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
234C2E47000
heap
page read and write
3141000
heap
page read and write
210C7005000
trusted library allocation
page read and write
37F9000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
1429000
heap
page read and write
2DA0000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
37EC000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2EA5000
heap
page read and write
7FF7AECE0000
unkown
page readonly
210C5065000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
3930000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
2B0A000
trusted library section
page read and write
2B1A000
trusted library section
page read and write
6D6000
heap
page read and write
210C7006000
trusted library allocation
page read and write
210C504F000
heap
page read and write
620000
heap
page read and write
758000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
210C5051000
heap
page read and write
141B000
heap
page read and write
1410000
heap
page read and write
210C7001000
trusted library allocation
page read and write
D99000
stack
page read and write
C41000
heap
page read and write
234C2EBD000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
1CA000
unkown
page read and write
1096000
heap
page read and write
3141000
heap
page read and write
3ADC000
trusted library allocation
page read and write
3141000
heap
page read and write
210C5051000
heap
page read and write
38A9000
trusted library allocation
page read and write
429E000
stack
page read and write
210C50D4000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
6D6000
heap
page read and write
234C4730000
heap
page read and write
2FF0000
heap
page read and write
5C8000
heap
page read and write
3141000
heap
page read and write
6C160000
unkown
page readonly
13A4000
heap
page read and write
5A4000
heap
page read and write
2CF0000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
3650000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
2FD0000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
3A34000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
29A0000
heap
page read and write
3170000
heap
page read and write
3040000
heap
page read and write
210C5021000
heap
page read and write
39B2000
trusted library allocation
page read and write
5488000
heap
page read and write
3942000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
210C506A000
heap
page read and write
6BAA8000
unkown
page read and write
13CF000
heap
page read and write
3141000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
6BE7B000
unkown
page readonly
147E000
heap
page read and write
350C000
heap
page read and write
3DFE000
stack
page read and write
1D0000
heap
page read and write
D2E2DCA000
stack
page read and write
146D000
heap
page read and write
210C7001000
trusted library allocation
page read and write
9B0000
heap
page read and write
594D000
heap
page read and write
3948000
trusted library allocation
page read and write
142F000
unkown
page read and write
210C6FFC000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
3B7B000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
10B3000
heap
page read and write
2A00000
heap
page read and write
4E0000
heap
page read and write
234C2EBA000
heap
page read and write
36E4000
trusted library allocation
page read and write
14F0000
unkown
page read and write
234C2E9F000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
C24000
heap
page read and write
1284000
heap
page read and write
36D0000
trusted library allocation
page read and write
14D4000
heap
page read and write
13CF000
heap
page read and write
3B2C000
trusted library allocation
page read and write
39F5000
trusted library allocation
page read and write
32C0000
heap
page read and write
574E000
stack
page read and write
36F0000
heap
page read and write
2DA0000
trusted library allocation
page read and write
13FE000
heap
page read and write
3141000
heap
page read and write
234C2EBA000
heap
page read and write
210C5051000
heap
page read and write
3141000
heap
page read and write
234C2E9F000
heap
page read and write
17D6000
heap
page read and write
3620000
heap
page read and write
210C7003000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
3FA6000
trusted library allocation
page read and write
3141000
heap
page read and write
1070000
trusted library allocation
page read and write
554000
heap
page read and write
14B8000
heap
page read and write
314A000
heap
page read and write
3141000
heap
page read and write
234C4EFF000
heap
page read and write
554000
heap
page read and write
10F2000
heap
page read and write
779000
heap
page read and write
3141000
heap
page read and write
35A9000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
13C7000
heap
page read and write
4FC000
stack
page read and write
147E000
heap
page read and write
7D000
unkown
page readonly
234C4AFA000
trusted library allocation
page read and write
37ED000
trusted library allocation
page read and write
398B000
trusted library allocation
page read and write
14CD000
heap
page read and write
31B0000
heap
page read and write
147E000
heap
page read and write
393B000
trusted library allocation
page read and write
14A8000
stack
page read and write
3E9A000
trusted library section
page read and write
3141000
heap
page read and write
234C4B07000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
37B0000
heap
page read and write
13DB000
heap
page read and write
13C7000
heap
page read and write
37BF000
trusted library allocation
page read and write
1091000
heap
page read and write
6CBFD000
unkown
page readonly
554000
heap
page read and write
1230000
heap
page read and write
13DB000
heap
page read and write
3050000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
36B0000
heap
page read and write
39BC000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
210C7001000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
3100000
heap
page read and write
F7B000
stack
page read and write
234C2EA5000
heap
page read and write
38BF000
trusted library allocation
page read and write
13C5000
heap
page read and write
758000
heap
page read and write
234C2EB8000
heap
page read and write
858000
unkown
page write copy
DD0000
heap
page read and write
10E8000
heap
page read and write
13CF000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
13C7000
heap
page read and write
DC6000
heap
page read and write
1478000
heap
page read and write
370E000
trusted library allocation
page read and write
3A4A000
heap
page read and write
101E000
unkown
page readonly
3470000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
720000
heap
page read and write
37F7000
trusted library allocation
page read and write
234C4B0D000
trusted library allocation
page read and write
210C5051000
heap
page read and write
13BF000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
147A000
heap
page read and write
37FE000
trusted library allocation
page read and write
1091000
heap
page read and write
210C504E000
heap
page read and write
1469000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
315F000
heap
page read and write
6B3000
heap
page read and write
2E42000
trusted library allocation
page read and write
36EF000
trusted library allocation
page read and write
210C6FFB000
trusted library allocation
page read and write
6C9000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
14BB000
heap
page read and write
37F8000
trusted library allocation
page read and write
10BD000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
210C6FF2000
trusted library allocation
page read and write
3320000
heap
page read and write
143A000
heap
page read and write
6C161000
unkown
page execute read
36D6000
trusted library allocation
page read and write
13CF000
heap
page read and write
1406000
heap
page read and write
14B6000
heap
page read and write
210C5006000
heap
page read and write
3964000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
3141000
heap
page read and write
3B92000
trusted library allocation
page read and write
234C4B06000
trusted library allocation
page read and write
D2E327E000
stack
page read and write
38E0000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
1091000
heap
page read and write
13E0000
heap
page read and write
100C000
unkown
page read and write
3141000
heap
page read and write
13DB000
heap
page read and write
3A3A000
trusted library allocation
page read and write
435F000
stack
page read and write
3141000
heap
page read and write
3230000
heap
page read and write
3B9B000
trusted library allocation
page read and write
3B99000
trusted library allocation
page read and write
10DF000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
36C0000
heap
page read and write
C34000
heap
page read and write
3141000
heap
page read and write
393E000
stack
page read and write
3020000
heap
page read and write
210C506A000
heap
page read and write
13DB000
heap
page read and write
359F000
trusted library allocation
page read and write
234C4900000
heap
page read and write
10E1000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
398F000
trusted library allocation
page read and write
3220000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
210C5051000
heap
page read and write
1274000
heap
page read and write
2DA0000
trusted library allocation
page read and write
14CD000
heap
page read and write
36D8000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
3A5B000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
34A0000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
1480000
heap
page read and write
10B0000
heap
page read and write
3704000
trusted library allocation
page read and write
10DD000
heap
page read and write
234C2EB8000
heap
page read and write
234C2E73000
heap
page read and write
3141000
heap
page read and write
3320000
heap
page read and write
3141000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
3180000
heap
page read and write
36D6000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
B80000
heap
page read and write
3FA5000
trusted library allocation
page read and write
554000
heap
page read and write
1415000
heap
page read and write
3310000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3320000
heap
page read and write
3901000
trusted library allocation
page read and write
36E6000
trusted library allocation
page read and write
35A2000
trusted library allocation
page read and write
1B4000
heap
page read and write
1B22C15E000
heap
page read and write
3080000
heap
page read and write
3350000
heap
page read and write
437E000
stack
page read and write
3987000
trusted library allocation
page read and write
1469000
heap
page read and write
147A000
heap
page read and write
13C3000
heap
page read and write
210C7003000
trusted library allocation
page read and write
78000
unkown
page read and write
234C4AFF000
trusted library allocation
page read and write
234C4AFD000
trusted library allocation
page read and write
14BB000
heap
page read and write
10DC000
heap
page read and write
210C504D000
heap
page read and write
210C504D000
heap
page read and write
3350000
heap
page read and write
3020000
trusted library allocation
page read and write
136E000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
3000000
heap
page read and write
3989000
trusted library allocation
page read and write
210C506A000
heap
page read and write
3200000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
1CD000
unkown
page readonly
6CC01000
unkown
page execute read
141B000
heap
page read and write
3860000
heap
page read and write
234C4AFE000
trusted library allocation
page read and write
234C4AFF000
trusted library allocation
page read and write
3141000
heap
page read and write
6A8000
heap
page read and write
3260000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
234C2E9F000
heap
page read and write
2D20000
trusted library allocation
page read and write
1084000
heap
page read and write
3990000
heap
page read and write
37F6000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
835000
heap
page read and write
2ED0000
trusted library allocation
page read and write
3360000
heap
page read and write
210C50D4000
trusted library allocation
page read and write
3630000
heap
page read and write
3060000
heap
page read and write
36A7000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
3516000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
2850000
heap
page read and write
210C506B000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
7FF7AEC21000
unkown
page execute read
3869000
trusted library allocation
page read and write
4600000
heap
page read and write
6A0000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
13DB000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
837000
heap
page read and write
3050000
heap
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
2DA0000
trusted library allocation
page read and write
1429000
heap
page read and write
210C50D0000
trusted library allocation
page read and write
3240000
direct allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
13C7000
heap
page read and write
3ED0000
trusted library allocation
page read and write
3030000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
3968000
trusted library allocation
page read and write
210C50D4000
trusted library allocation
page read and write
7A000
unkown
page write copy
14C9000
heap
page read and write
469F000
stack
page read and write
38AD000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
3690000
heap
page read and write
2D20000
trusted library allocation
page read and write
234C2EB9000
heap
page read and write
101E000
unkown
page readonly
234C2EB8000
heap
page read and write
38DE000
trusted library allocation
page read and write
54D000
stack
page read and write
2DA0000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
3141000
heap
page read and write
147D000
heap
page read and write
13F6000
heap
page read and write
35A4000
trusted library allocation
page read and write
13DC000
heap
page read and write
28299B8C000
heap
page read and write
37BE000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
35A5000
trusted library allocation
page read and write
C44000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
1276000
heap
page read and write
234C2E57000
heap
page read and write
1469000
heap
page read and write
234C4960000
heap
page read and write
234C2EBD000
heap
page read and write
1700000
trusted library allocation
page read and write
3040000
heap
page read and write
3320000
heap
page read and write
3504000
trusted library allocation
page read and write
2E4F000
trusted library allocation
page read and write
775000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
210C5051000
heap
page read and write
3984000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
210C6FFF000
trusted library allocation
page read and write
B2970FE000
stack
page read and write
1002000
unkown
page execute read
1CD000
unkown
page readonly
508E000
stack
page read and write
592A000
heap
page read and write
13DB000
heap
page read and write
3A31000
trusted library allocation
page read and write
234C4B06000
trusted library allocation
page read and write
234C4AFE000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
13DC000
heap
page read and write
3510000
heap
page read and write
C3F000
heap
page read and write
3949000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
3141000
heap
page read and write
37EB000
trusted library allocation
page read and write
CAE000
heap
page read and write
3879000
trusted library allocation
page read and write
234C2EA0000
heap
page read and write
3690000
heap
page read and write
3A4E000
heap
page read and write
70F000
stack
page read and write
210C4FF7000
heap
page read and write
210C5006000
heap
page read and write
2D20000
trusted library allocation
page read and write
3B50000
heap
page read and write
210C7000000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
10BD000
heap
page read and write
1720000
heap
page read and write
2E49000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
210C5056000
heap
page read and write
110D000
heap
page read and write
39BA000
trusted library allocation
page read and write
37E7000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
36DD000
trusted library allocation
page read and write
39B3000
trusted library allocation
page read and write
210C7006000
trusted library allocation
page read and write
210C6FF4000
trusted library allocation
page read and write
46DB000
stack
page read and write
3660000
heap
page read and write
1264000
heap
page read and write
10B2000
heap
page read and write
13DB000
heap
page read and write
210C5051000
heap
page read and write
5120000
heap
page read and write
1416000
heap
page read and write
3E3A000
stack
page read and write
1076000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
142B000
heap
page read and write
210C5016000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
234C2EA0000
heap
page read and write
234C2E75000
heap
page read and write
837000
heap
page read and write
3210000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2EBA000
heap
page read and write
234C2DF4000
trusted library allocation
page read and write
EFB000
stack
page read and write
2DA0000
trusted library allocation
page read and write
161000
unkown
page execute read
DD000
stack
page read and write
3330000
heap
page read and write
3141000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
3141000
heap
page read and write
3903000
trusted library allocation
page read and write
234C2EB8000
heap
page read and write
234C2EA1000
heap
page read and write
210C5006000
heap
page read and write
210C5051000
heap
page read and write
7F8000
heap
page read and write
37FC000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
13C7000
heap
page read and write
234C2EBA000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
3190000
heap
page read and write
210C6FFC000
trusted library allocation
page read and write
210C506A000
heap
page read and write
296BF7A5000
heap
page read and write
386B000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
394E000
trusted library allocation
page read and write
234C4AF5000
trusted library allocation
page read and write
1B22C148000
heap
page read and write
3E8A000
trusted library section
page read and write
C46000
heap
page read and write
3990000
heap
page read and write
3020000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
44FE000
stack
page read and write
3592000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2E9F000
heap
page read and write
71000
unkown
page execute read
142B000
heap
page read and write
3FA2000
trusted library allocation
page read and write
5A4000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
3141000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
393E000
trusted library allocation
page read and write
147A000
heap
page read and write
37E5000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
31C0000
heap
page read and write
3020000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
10D4000
heap
page read and write
210C6FFD000
trusted library allocation
page read and write
3FA9000
trusted library allocation
page read and write
1385000
heap
page read and write
905000
heap
page read and write
210C7004000
trusted library allocation
page read and write
14D6000
heap
page read and write
210C504D000
heap
page read and write
2FF0000
heap
page read and write
14B6000
heap
page read and write
210C506B000
heap
page read and write
38AF000
trusted library allocation
page read and write
14CD000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
3041000
heap
page read and write
9AD000
unkown
page readonly
210C506A000
heap
page read and write
1418000
heap
page read and write
359B000
trusted library allocation
page read and write
2FD0000
heap
page read and write
3141000
heap
page read and write
3220000
heap
page read and write
210C5006000
heap
page read and write
B40000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
36E1000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
38B0000
heap
page read and write
234C2D50000
heap
page read and write
13DB000
heap
page read and write
1238000
heap
page read and write
3141000
heap
page read and write
C51000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
3620000
heap
page read and write
5A4000
heap
page read and write
1DE000
stack
page read and write
141B000
heap
page read and write
3945000
trusted library allocation
page read and write
210C504D000
heap
page read and write
12C1000
heap
page read and write
363D000
trusted library allocation
page read and write
3660000
heap
page read and write
234C2EBD000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
210C6FFE000
trusted library allocation
page read and write
210C6FFE000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
37A0000
heap
page read and write
33D0000
heap
page read and write
142B000
heap
page read and write
13E1000
heap
page read and write
3340000
heap
page read and write
210C6FF9000
trusted library allocation
page read and write
14BB000
heap
page read and write
3B9F000
trusted library allocation
page read and write
3677000
trusted library allocation
page read and write
6CC1F000
unkown
page readonly
31A0000
heap
page read and write
1469000
heap
page read and write
36D2000
trusted library allocation
page read and write
3010000
heap
page read and write
28299B20000
heap
page read and write
210C6FF6000
trusted library allocation
page read and write
210C7003000
trusted library allocation
page read and write
32F0000
heap
page read and write
234C4EF0000
heap
page read and write
210C5006000
heap
page read and write
210C7004000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
14CD000
heap
page read and write
234C4B01000
trusted library allocation
page read and write
3300000
heap
page read and write
146F000
heap
page read and write
39A0000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
5A4000
heap
page read and write
14CD000
heap
page read and write
2FA0000
heap
page read and write
10CB000
heap
page read and write
58E1000
heap
page read and write
400000
heap
page read and write
210C7001000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
210C6FFC000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
147E000
heap
page read and write
2F00000
trusted library allocation
page read and write
5A4000
heap
page read and write
1416000
heap
page read and write
7FF7AEC21000
unkown
page execute read
3020000
heap
page read and write
3A33000
trusted library allocation
page read and write
386F000
trusted library allocation
page read and write
1418000
heap
page read and write
36EE000
trusted library allocation
page read and write
98B000
unkown
page readonly
147A000
heap
page read and write
13DC000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
210C5021000
heap
page read and write
234C2E75000
heap
page read and write
234C2E75000
heap
page read and write
1710000
heap
page read and write
10AD000
heap
page read and write
3941000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
3141000
heap
page read and write
3AD5000
trusted library allocation
page read and write
1469000
heap
page read and write
5B7000
heap
page read and write
31D0000
heap
page read and write
10000
unkown
page readonly
1700000
trusted library allocation
page read and write
13C7000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
210C7004000
trusted library allocation
page read and write
3141000
heap
page read and write
14A9000
heap
page read and write
37BC000
trusted library allocation
page read and write
234C2E73000
heap
page read and write
3141000
heap
page read and write
210C7001000
trusted library allocation
page read and write
147A000
heap
page read and write
3141000
heap
page read and write
6C6000
heap
page read and write
940000
unkown
page readonly
234C2DF4000
trusted library allocation
page read and write
10CE000
heap
page read and write
3141000
heap
page read and write
234C4B04000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
3FA7000
trusted library allocation
page read and write
234C2EBE000
heap
page read and write
3141000
heap
page read and write
13CB000
heap
page read and write
234C2E57000
heap
page read and write
39D8000
trusted library allocation
page read and write
3950000
heap
page read and write
234C2EBA000
heap
page read and write
3141000
heap
page read and write
592A000
heap
page read and write
6DDE000
stack
page read and write
13DE000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
47DF000
stack
page read and write
3702000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
141B000
heap
page read and write
210C7006000
trusted library allocation
page read and write
3A40000
heap
page read and write
10E5000
heap
page read and write
3B35000
trusted library allocation
page read and write
2CE0000
heap
page read and write
1700000
trusted library allocation
page read and write
210C6FFA000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
48FF000
stack
page read and write
161000
unkown
page execute read
234C4AFA000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
234C4B08000
trusted library allocation
page read and write
3983000
trusted library allocation
page read and write
3CC0000
heap
page read and write
234C4B06000
trusted library allocation
page read and write
3141000
heap
page read and write
234C2EBA000
heap
page read and write
210C7005000
trusted library allocation
page read and write
39BA000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
234C2EBA000
heap
page read and write
210C7002000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
14BB000
heap
page read and write
1429000
heap
page read and write
37FA000
trusted library allocation
page read and write
210C504D000
heap
page read and write
1000000
unkown
page readonly
32E0000
heap
page read and write
35E0000
heap
page read and write
5C3000
heap
page read and write
3939000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
4B9F000
stack
page read and write
210C7005000
trusted library allocation
page read and write
234C4B02000
trusted library allocation
page read and write
39B1000
trusted library allocation
page read and write
210C5051000
heap
page read and write
234C4AFB000
trusted library allocation
page read and write
140F000
heap
page read and write
3680000
heap
page read and write
390D000
trusted library allocation
page read and write
10CC000
heap
page read and write
140000
heap
page read and write
3970000
heap
page read and write
78000
unkown
page write copy
210C50D0000
trusted library allocation
page read and write
797000
heap
page read and write
32D0000
heap
page read and write
37BE000
trusted library allocation
page read and write
234C4B00000
trusted library allocation
page read and write
210C5006000
heap
page read and write
3300000
heap
page read and write
2DA0000
trusted library allocation
page read and write
234C4B03000
trusted library allocation
page read and write
3141000
heap
page read and write
3FC000
stack
page read and write
210C50D4000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
13B0000
heap
page read and write
DDF000
stack
page read and write
210C7005000
trusted library allocation
page read and write
6BDA0000
unkown
page read and write
7190000
heap
page read and write
2E41000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
234C4B01000
trusted library allocation
page read and write
5E4000
heap
page read and write
35A3000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
EF44FFE000
stack
page read and write
234C4B00000
trusted library allocation
page read and write
3620000
heap
page read and write
3180000
heap
page read and write
10B5000
heap
page read and write
234C4AFA000
trusted library allocation
page read and write
37D0000
heap
page read and write
147E000
heap
page read and write
2ED0000
trusted library allocation
page read and write
31C0000
heap
page read and write
14BB000
heap
page read and write
13CF000
heap
page read and write
2E5B000
trusted library allocation
page read and write
6CBE1000
unkown
page execute read
3506000
trusted library allocation
page read and write
CD4000
heap
page read and write
3E90000
trusted library section
page read and write
234C4B01000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
210C6FFD000
trusted library allocation
page read and write
352A000
heap
page read and write
370E000
trusted library allocation
page read and write
142B000
heap
page read and write
10B0000
heap
page read and write
3141000
heap
page read and write
3F3E000
stack
page read and write
234C2EA5000
heap
page read and write
3800000
trusted library allocation
page read and write
3040000
heap
page read and write
32E0000
heap
page read and write
3020000
trusted library allocation
page read and write
13DC000
heap
page read and write
1464000
heap
page read and write
234C2E67000
heap
page read and write
147E000
heap
page read and write
210C5070000
heap
page read and write
1253000
heap
page read and write
210C6FFB000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
1370000
heap
page read and write
3523000
heap
page read and write
3A48000
heap
page read and write
234C2E57000
heap
page read and write
234C2DF0000
trusted library allocation
page read and write
3947000
trusted library allocation
page read and write
234C4B09000
trusted library allocation
page read and write
3190000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
3630000
heap
page read and write
3360000
heap
page read and write
13CF000
heap
page read and write
234C2E75000
heap
page read and write
3141000
heap
page read and write
10E7000
heap
page read and write
3B3A000
trusted library allocation
page read and write
900000
heap
page read and write
3B2A000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
31C0000
heap
page read and write
14CD000
heap
page read and write
3470000
trusted library allocation
page read and write
210C7002000
trusted library allocation
page read and write
36A0000
heap
page read and write
1500000
heap
page read and write
39FD000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
37F6000
trusted library allocation
page read and write
37FD000
trusted library allocation
page read and write
234C4AFA000
trusted library allocation
page read and write
3240000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
37B0000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
1429000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
3300000
heap
page read and write
11000
unkown
page execute read
3937000
trusted library allocation
page read and write
147D000
heap
page read and write
5E0000
heap
page read and write
47DD000
stack
page read and write
234C4AFA000
trusted library allocation
page read and write
1002000
unkown
page execute read
351E000
heap
page read and write
3511000
heap
page read and write
38AB000
trusted library allocation
page read and write
234C2DF0000
trusted library allocation
page read and write
13FE000
heap
page read and write
10CC000
heap
page read and write
1104000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
234C2EA5000
heap
page read and write
210C5067000
heap
page read and write
34FB000
stack
page read and write
3B27000
trusted library allocation
page read and write
C0C000
heap
page read and write
210C5021000
heap
page read and write
3944000
trusted library allocation
page read and write
39B4000
trusted library allocation
page read and write
70000
unkown
page readonly
210C700D000
trusted library allocation
page read and write
5CB0000
remote allocation
page read and write
3932000
trusted library allocation
page read and write
1438000
heap
page read and write
36E0000
heap
page read and write
3141000
heap
page read and write
32B0000
heap
page read and write
234C2E73000
heap
page read and write
3141000
heap
page read and write
13DB000
heap
page read and write
210C506F000
heap
page read and write
1000000
unkown
page readonly
5A4000
heap
page read and write
39BD000
trusted library allocation
page read and write
6E4000
heap
page read and write
210C5006000
heap
page read and write
210C7000000
trusted library allocation
page read and write
234C4AFB000
trusted library allocation
page read and write
13C4000
heap
page read and write
37EA000
trusted library allocation
page read and write
3630000
heap
page read and write
210C7006000
trusted library allocation
page read and write
38DA000
trusted library allocation
page read and write
3300000
heap
page read and write
6B9C1000
unkown
page execute read
3815000
trusted library allocation
page read and write
210C50D0000
trusted library allocation
page read and write
3141000
heap
page read and write
210C700B000
trusted library allocation
page read and write
445F000
stack
page read and write
389A000
trusted library allocation
page read and write
36EF000
trusted library allocation
page read and write
15C000
stack
page read and write
7D000
unkown
page readonly
234C4AFB000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
234C2E57000
heap
page read and write
234C4AFF000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
3141000
heap
page read and write
13C7000
heap
page read and write
5930000
heap
page read and write
37F0000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
6E4000
heap
page read and write
36AF000
trusted library allocation
page read and write
138E000
stack
page read and write
3892000
trusted library allocation
page read and write
909000
heap
page read and write
147D000
heap
page read and write
234C2E9F000
heap
page read and write
3141000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
6CEF000
stack
page read and write
146F000
heap
page read and write
3E60000
trusted library allocation
page read and write
3142000
heap
page read and write
386E000
trusted library allocation
page read and write
664000
heap
page read and write
234C4AFD000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
5144000
heap
page read and write
3141000
heap
page read and write
210C504F000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
1478000
heap
page read and write
210C5051000
heap
page read and write
210C504D000
heap
page read and write
2DA0000
trusted library allocation
page read and write
C88000
heap
page read and write
3671000
trusted library allocation
page read and write
234C4B04000
trusted library allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
3000000
heap
page read and write
C05000
heap
page read and write
234C2E73000
heap
page read and write
1395000
heap
page read and write
3141000
heap
page read and write
3020000
trusted library allocation
page read and write
210C7005000
trusted library allocation
page read and write
109C000
heap
page read and write
210C7001000
trusted library allocation
page read and write
3141000
heap
page read and write
234C4B02000
trusted library allocation
page read and write
234C4AF2000
trusted library allocation
page read and write
14CD000
heap
page read and write
37EE000
trusted library allocation
page read and write
210C504D000
heap
page read and write
234C2E73000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
210C504D000
heap
page read and write
234C2EA9000
heap
page read and write
1474000
heap
page read and write
C1E000
heap
page read and write
33FC000
stack
page read and write
234C4AFD000
trusted library allocation
page read and write
234C2E75000
heap
page read and write
234C4B05000
trusted library allocation
page read and write
3141000
heap
page read and write
3B22000
heap
page read and write
3141000
heap
page read and write
13CF000
heap
page read and write
141B000
heap
page read and write
234C2E73000
heap
page read and write
76E000
stack
page read and write
210C5021000
heap
page read and write
1F8CD840000
heap
page read and write
234C4AFC000
trusted library allocation
page read and write
1443000
heap
page read and write
210C6FFA000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
3AD0000
heap
page read and write
3966000
trusted library allocation
page read and write
234C2DF4000
trusted library allocation
page read and write
234C2EB8000
heap
page read and write
234C2E9F000
heap
page read and write
234C2EA5000
heap
page read and write
210C7001000
trusted library allocation
page read and write
594A000
heap
page read and write
2D20000
trusted library allocation
page read and write
234C2EBF000
heap
page read and write
1418000
heap
page read and write
234C4B03000
trusted library allocation
page read and write
B10000
heap
page read and write
2E55000
trusted library allocation
page read and write
39D6000
trusted library allocation
page read and write
161000
unkown
page execute read
370A000
trusted library allocation
page read and write
3AD1000
trusted library allocation
page read and write
13E4000
heap
page read and write
146F000
heap
page read and write
210C6FFF000
trusted library allocation
page read and write
There are 4697 hidden memdumps, click here to show them.