IOC Report
goXq0JH6sn.exe

loading gif

Files

File Path
Type
Category
Malicious
goXq0JH6sn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\$WinREAgent\Scratch\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\$WinREAgent\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\PerfLogs\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Windows Media Player\Media Renderer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Windows Media Player\Network Sharing\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Windows Media Player\Skins\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Windows Media Player\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\7-Zip\7-zip.dll
data
dropped
malicious
C:\Program Files\7-Zip\7-zip32.dll
data
dropped
malicious
C:\Program Files\7-Zip\7z.dll
data
dropped
malicious
C:\Program Files\7-Zip\7z.exe
data
dropped
malicious
C:\Program Files\7-Zip\7zFM.exe
data
dropped
malicious
C:\Program Files\7-Zip\7zG.exe
data
dropped
malicious
C:\Program Files\7-Zip\Uninstall.exe
OpenPGP Secret Key
dropped
malicious
C:\Program Files\7-Zip\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Common Files\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Google\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Internet Explorer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\MSBuild\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Microsoft Office 15\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\crashreporter.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\default-browser-agent.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\freebl3.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\gkcodecs.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Mozilla Firefox\ipcclientcerts.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\lgpllibs.dll
OpenPGP Secret Key
dropped
malicious
C:\Program Files\Mozilla Firefox\libEGL.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\maintenanceservice.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\mozavcodec.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\mozavutil.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\mozglue.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\mozwer.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\msvcp140.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\notificationserver.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\nss3.dll
DOS executable (COM)
dropped
malicious
C:\Program Files\Mozilla Firefox\nssckbi.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\osclientcerts.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\pingsender.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\plugin-container.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\private_browsing.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\qipcap64.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\softokn3.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\updater.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\vcruntime140.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\vcruntime140_1.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\xul.dll
data
dropped
malicious
C:\Program Files\Reference Assemblies\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Uninstall Information\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Defender\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\goXq0JH6sn.exe
data
dropped
malicious
C:\Users\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\AutoIt3\Au3Check.dat
DOS executable (COM)
dropped
C:\Program Files (x86)\AutoIt3\Au3Check.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Au3Info.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Au3Info_x64.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe
mc68k executable (shared demand paged) not stripped
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\upx.exe
data
dropped
C:\Program Files (x86)\AutoIt3\AutoIt v3 Website.url
data
dropped
C:\Program Files (x86)\AutoIt3\AutoIt.chm
data
dropped
C:\Program Files (x86)\AutoIt3\AutoIt3Help.exe
data
dropped
C:\Program Files (x86)\AutoIt3\AutoIt3_x64.exe
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX.chm
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX.psd1
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.Assembly.dll
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.Assembly.xml
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.dll
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_DLL.h
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_DLL.lib
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_x64.dll
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_x64_DLL.lib
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Examples\_ReadMe_.txt
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\calculator.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\count-do.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Examples\count-for.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\count-while.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\functions.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\inputbox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Examples\msgbox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\notepad1.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\notepad2.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Extras\_ReadMe_.txt
data
dropped
C:\Program Files (x86)\AutoIt3\Extras\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Blue.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Green.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Red.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Yellow.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3script_v10.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3script_v11.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3script_v9.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\filetype-blank.ico
DOS executable (COM)
dropped
C:\Program Files (x86)\AutoIt3\Icons\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Include\APIComConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIDiagConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIDlgConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIErrorsConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIFilesConstants.au3
OpenPGP Public Key
dropped
C:\Program Files (x86)\AutoIt3\Include\APIGdiConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APILocaleConstants.au3
TeX packed font data (\014\315\374\360\3309R\242\353\304\004\021\016\321\357\352\004=\315\250Bi\222\030\177y'3Y\314\331R\241\200B\225>m\225B\347\310\262\220y3\356\210\315\364@\305Mw\034\317\306/*\352\255\355\246{\032krC\020Cgi\342\024u\204\327/\273\207i\232\255+f8\317S\304i\217\374\365\340I\374\244O\3628\274L)
dropped
C:\Program Files (x86)\AutoIt3\Include\APIMiscConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIProcConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIRegConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIResConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIShPathConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIShellExConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APISysConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIThemeConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\AVIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Array.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ArrayDisplayInternals.au3
DOS executable (COM)
dropped
C:\Program Files (x86)\AutoIt3\Include\AutoItConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\AutoItExitCodes.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\AutoItFatalExitConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\BorderConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ButtonConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\CUIAutomation2.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Clipboard.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Color.au3
OpenPGP Public Key
dropped
C:\Program Files (x86)\AutoIt3\Include\ColorConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ComboConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Constants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Crypt.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Date.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\DateTimeConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Debug.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\DirConstants.au3
COM executable for DOS
dropped
C:\Program Files (x86)\AutoIt3\Include\EditConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\EventLog.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Excel.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ExcelConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\FTPEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\File.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\FileConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\FontConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\FrameConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GDIPlus.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GDIPlusConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GUIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GUIConstantsEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiAVI.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiButton.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiComboBox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiComboBoxEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiCtrlInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiDateTimePicker.au3
OpenPGP Public Key
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiEdit.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiHeader.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiIPAddress.au3
DOS/MBR boot sector
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiImageList.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiListBox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiListView.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiMenu.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiMonthCal.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiReBar.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiRichEdit.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiScrollBars.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiSlider.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiStatusBar.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiTab.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiToolTip.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiToolbar.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiTreeView.au3
DOS executable (COM)
dropped
C:\Program Files (x86)\AutoIt3\Include\HeaderConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\IE.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\IPAddressConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ImageListConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Inet.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\InetConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ListBoxConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ListViewConstants.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\Math.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MathConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Memory.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MemoryConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MenuConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Misc.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MsgBoxConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\NTSTATUSConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\NamedPipes.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\NetShare.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\PowerPoint.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\PowerPointConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Process.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ProcessConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ProgressConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\RebarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\RichEditConstants.au3
IRIS Showcase file - version 120
dropped
C:\Program Files (x86)\AutoIt3\Include\SQLite.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SQLite.dll.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ScreenCapture.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ScrollBarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ScrollBarsConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Security.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SecurityConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SendMessage.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SliderConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Sound.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StaticConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StatusBarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\String.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StringConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StructureConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\TabConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Timers.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ToolTipConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ToolbarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\TrayConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\TreeViewConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\UDFGlobalID.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\UIAWrappers.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\UpDownConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Visa.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPI.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPICom.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIConv.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIDiag.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIDlg.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIError.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIFiles.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIGdi.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIGdiDC.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIGdiInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIHObj.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIIcons.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPILocale.au3
OpenPGP Public Key
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIMem.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIMisc.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIProc.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIReg.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIRes.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIShPath.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIShellEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPISys.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPISysInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPISysWin.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPITheme.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIlangConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIsysinfoConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIvkeysConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinNet.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WindowsConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WordConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\_ReadMe_.txt
data
dropped
C:\Program Files (x86)\AutoIt3\Include\analysistimer.au3
OpenPGP Public Key
dropped
C:\Program Files (x86)\AutoIt3\Include\cleanup.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\corporate.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\helper.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\htmlfetcher.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\htmlfetcherchrome.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Include\keylogger.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\liveprocess.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\stats.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\word.au3
data
dropped
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
data
dropped
C:\Program Files (x86)\AutoIt3\SciTE\au3.keywords.properties
data
dropped
C:\Program Files (x86)\AutoIt3\SciTE\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Uninstall.exe
data
dropped
C:\Program Files (x86)\AutoIt3\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\DESIGNER\MSADDNDR.OLB
data
dropped
C:\Program Files (x86)\Common Files\DESIGNER\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Java\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Microsoft Shared\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Oracle\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Services\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\System\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Google\Update\GoogleUpdate.bk
data
dropped
C:\Program Files (x86)\Google\Update\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Google\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\SIGNUP\install.ins
data
dropped
C:\Program Files (x86)\Internet Explorer\SIGNUP\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\images\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Java\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Java\jre-1.8\COPYRIGHT
data
dropped
C:\Program Files (x86)\Java\jre-1.8\LICENSE
data
dropped
C:\Program Files (x86)\Java\jre-1.8\README.txt
data
dropped
C:\Program Files (x86)\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt
data
dropped
C:\Program Files (x86)\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt
OpenPGP Secret Key
dropped
C:\Program Files (x86)\Java\jre-1.8\Welcome.html
data
dropped
C:\Program Files (x86)\Java\jre-1.8\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Java\jre-1.8\release
data
dropped
C:\Program Files (x86)\MSBuild\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\MSBuild\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\kms_host.vbs
data
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\kms_host.xml
data
dropped
C:\Program Files (x86)\MSECache\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\AppXManifest.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\FileSystemMetadata.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\OSPP.HTM
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\OSPPREARM.EXE
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\SLERROR.XML
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\Office16\vNextDiag.ps1
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0015-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0015-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0019-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0019-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001A-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001A-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0C0A-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-002A-0000-1000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-002A-0409-1000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-006E-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-012A-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-012B-0409-0000-0000000FF1CE.xml
OpenPGP Secret Key
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-3102-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.common.16.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifestLoc.16.en-us.xml
DOS executable (COM, 0x8C-variant)
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AuthoredExtensions.16.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\ThinAppXManifest.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\Updates\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\root\c2rx.sccd
data
dropped
C:\Program Files (x86)\Microsoft Office\root\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\Microsoft.mshtml.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\Microsoft.stdformat.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\adodb.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\msdatasrc.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\stdole.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\RedistList\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\EdgeCore\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\EdgeWebView\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\Edge\Edge.dat
data
dropped
C:\Program Files (x86)\Microsoft\Edge\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\Temp\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe
data
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\logs\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log
data
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
data
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\updater.ini
data
dropped
C:\Program Files (x86)\Reference Assemblies\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Reference Assemblies\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Defender\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Defender\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Mail\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\Visualizations\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Multimedia Platform\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows NT\Accessories\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows NT\TableTextService\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows NT\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Photo Viewer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Photo Viewer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Portable Devices\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\Modules\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\bdedZmoxlsNFLespKkjlrRxIPcTibiWzRYfwIEqbnFMVGYKlIjuVrAnqxdPQRpruJW\WLASMFXiIcreIkDjIZq.exe
data
dropped
C:\Program Files (x86)\bdedZmoxlsNFLespKkjlrRxIPcTibiWzRYfwIEqbnFMVGYKlIjuVrAnqxdPQRpruJW\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\jDownloader\config\database.script
data
dropped
C:\Program Files (x86)\jDownloader\config\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\jDownloader\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\7-Zip\7-zip.chm
data
dropped
C:\Program Files\7-Zip\7z.sfx
data
dropped
C:\Program Files\7-Zip\7zCon.sfx
PGP Secret Sub-key -
dropped
C:\Program Files\7-Zip\History.txt
data
dropped
C:\Program Files\7-Zip\Lang\af.txt
data
dropped
C:\Program Files\7-Zip\Lang\an.txt
data
dropped
C:\Program Files\7-Zip\Lang\ar.txt
data
dropped
C:\Program Files\7-Zip\Lang\ast.txt
data
dropped
C:\Program Files\7-Zip\Lang\az.txt
data
dropped
C:\Program Files\7-Zip\Lang\ba.txt
data
dropped
C:\Program Files\7-Zip\Lang\be.txt
data
dropped
C:\Program Files\7-Zip\Lang\bg.txt
data
dropped
C:\Program Files\7-Zip\Lang\bn.txt
data
dropped
C:\Program Files\7-Zip\Lang\br.txt
data
dropped
C:\Program Files\7-Zip\Lang\ca.txt
data
dropped
C:\Program Files\7-Zip\Lang\co.txt
data
dropped
C:\Program Files\7-Zip\Lang\cs.txt
data
dropped
C:\Program Files\7-Zip\Lang\cy.txt
data
dropped
C:\Program Files\7-Zip\Lang\da.txt
data
dropped
C:\Program Files\7-Zip\Lang\de.txt
data
dropped
C:\Program Files\7-Zip\Lang\el.txt
data
dropped
C:\Program Files\7-Zip\Lang\en.ttt
data
dropped
C:\Program Files\7-Zip\Lang\eo.txt
data
dropped
C:\Program Files\7-Zip\Lang\es.txt
data
dropped
C:\Program Files\7-Zip\Lang\et.txt
data
dropped
C:\Program Files\7-Zip\Lang\eu.txt
data
dropped
C:\Program Files\7-Zip\Lang\ext.txt
data
dropped
C:\Program Files\7-Zip\Lang\fa.txt
DOS executable (COM)
dropped
C:\Program Files\7-Zip\Lang\fi.txt
data
dropped
C:\Program Files\7-Zip\Lang\fr.txt
data
dropped
C:\Program Files\7-Zip\Lang\fur.txt
data
dropped
C:\Program Files\7-Zip\Lang\fy.txt
data
dropped
C:\Program Files\7-Zip\Lang\ga.txt
data
dropped
C:\Program Files\7-Zip\Lang\gl.txt
OpenPGP Secret Key
dropped
C:\Program Files\7-Zip\Lang\gu.txt
data
dropped
C:\Program Files\7-Zip\Lang\he.txt
data
dropped
C:\Program Files\7-Zip\Lang\hi.txt
data
dropped
C:\Program Files\7-Zip\Lang\hr.txt
data
dropped
C:\Program Files\7-Zip\Lang\hu.txt
data
dropped
C:\Program Files\7-Zip\Lang\hy.txt
data
dropped
C:\Program Files\7-Zip\Lang\id.txt
data
dropped
C:\Program Files\7-Zip\Lang\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\7-Zip\Lang\io.txt
data
dropped
C:\Program Files\7-Zip\Lang\is.txt
data
dropped
C:\Program Files\7-Zip\Lang\it.txt
data
dropped
C:\Program Files\7-Zip\Lang\ja.txt
data
dropped
C:\Program Files\7-Zip\Lang\ka.txt
data
dropped
C:\Program Files\7-Zip\Lang\kaa.txt
data
dropped
C:\Program Files\7-Zip\Lang\kab.txt
data
dropped
C:\Program Files\7-Zip\Lang\kk.txt
data
dropped
C:\Program Files\7-Zip\Lang\ko.txt
data
dropped
C:\Program Files\7-Zip\Lang\ku-ckb.txt
PGP Secret Sub-key -
dropped
C:\Program Files\7-Zip\Lang\ku.txt
data
dropped
C:\Program Files\7-Zip\Lang\ky.txt
data
dropped
C:\Program Files\7-Zip\Lang\lij.txt
data
dropped
C:\Program Files\7-Zip\Lang\lt.txt
data
dropped
C:\Program Files\7-Zip\Lang\lv.txt
data
dropped
C:\Program Files\7-Zip\Lang\mk.txt
data
dropped
C:\Program Files\7-Zip\Lang\mn.txt
data
dropped
C:\Program Files\7-Zip\Lang\mng.txt
data
dropped
C:\Program Files\7-Zip\Lang\mng2.txt
data
dropped
C:\Program Files\7-Zip\Lang\mr.txt
data
dropped
C:\Program Files\7-Zip\Lang\ms.txt
PGP Secret Sub-key -
dropped
C:\Program Files\7-Zip\Lang\nb.txt
data
dropped
C:\Program Files\7-Zip\Lang\ne.txt
data
dropped
C:\Program Files\7-Zip\Lang\nl.txt
data
dropped
C:\Program Files\7-Zip\Lang\nn.txt
data
dropped
C:\Program Files\7-Zip\Lang\pa-in.txt
data
dropped
C:\Program Files\7-Zip\Lang\pl.txt
data
dropped
C:\Program Files\7-Zip\Lang\ps.txt
data
dropped
C:\Program Files\7-Zip\Lang\pt-br.txt
OpenPGP Public Key
dropped
C:\Program Files\7-Zip\Lang\pt.txt
data
dropped
C:\Program Files\7-Zip\Lang\ro.txt
data
dropped
C:\Program Files\7-Zip\Lang\ru.txt
data
dropped
C:\Program Files\7-Zip\Lang\sa.txt
data
dropped
C:\Program Files\7-Zip\Lang\si.txt
data
dropped
C:\Program Files\7-Zip\Lang\sk.txt
data
dropped
C:\Program Files\7-Zip\Lang\sl.txt
data
dropped
C:\Program Files\7-Zip\Lang\sq.txt
data
dropped
C:\Program Files\7-Zip\Lang\sr-spc.txt
data
dropped
C:\Program Files\7-Zip\Lang\sr-spl.txt
data
dropped
C:\Program Files\7-Zip\Lang\sv.txt
data
dropped
C:\Program Files\7-Zip\Lang\sw.txt
data
dropped
C:\Program Files\7-Zip\Lang\ta.txt
data
dropped
C:\Program Files\7-Zip\Lang\tg.txt
data
dropped
C:\Program Files\7-Zip\Lang\th.txt
data
dropped
C:\Program Files\7-Zip\Lang\tk.txt
data
dropped
C:\Program Files\7-Zip\Lang\tr.txt
data
dropped
C:\Program Files\7-Zip\Lang\tt.txt
data
dropped
C:\Program Files\7-Zip\Lang\ug.txt
OpenPGP Secret Key
dropped
C:\Program Files\7-Zip\Lang\uk.txt
data
dropped
C:\Program Files\7-Zip\Lang\uz-cyrl.txt
OpenPGP Public Key
dropped
C:\Program Files\7-Zip\Lang\uz.txt
data
dropped
C:\Program Files\7-Zip\Lang\va.txt
data
dropped
C:\Program Files\7-Zip\Lang\vi.txt
data
dropped
C:\Program Files\7-Zip\Lang\yo.txt
data
dropped
C:\Program Files\7-Zip\Lang\zh-cn.txt
data
dropped
C:\Program Files\7-Zip\Lang\zh-tw.txt
data
dropped
C:\Program Files\7-Zip\License.txt
data
dropped
C:\Program Files\7-Zip\descript.ion
data
dropped
C:\Program Files\7-Zip\readme.txt
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ACE.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ADNotificationManager.exe
DOS executable (COM)
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ADelRCP.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AGM.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AGMGPUOptIn.ini
DOS executable (COM, 0x8C-variant)
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AIDE.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ANCUtility.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AXE8SharedExpat.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AXSLE.dll
zlib compressed data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroBroker.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroDunamis.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroTextExtractor.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Adobe.Acrobat.Dependencies.manifest
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeLinguistic.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeXMP.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\BIB.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\BIBUtils.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CRClient.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CRLogTransport.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CRWindowsClientService.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Click on 'Change' to select default PDF handler.pdf
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CoolType.dll
OpenPGP Public Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\DirectInk.dll
OpenPGP Secret Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Eula.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ExtendScript.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\JP2KLib.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\LogTransport2.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\PDFPrevHndlr.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\PDFSigQFormalRep.pdf
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\RTC.der
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ReaderUC.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ScCore.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ShowAppPickerForPDF.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ViewerPS.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat.tlb
OpenPGP Public Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\adobeafp.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ahclient.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_asym.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_base.dll
OpenPGP Secret Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_base_non_fips.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_ecc.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\cr_win_client_config.cfg
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\cryptocme.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\cryptocme.sig
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icucnv58.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icucnv67.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icucnv69.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icudt58.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icudt67.dll
OpenPGP Public Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icudt69.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icuuc58.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icuuc67.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icuuc69.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\logsession.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\pe.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\pmd.cer
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\rt3d.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\sqlite.dll
OpenPGP Public Key
dropped
C:\Program Files\Adobe\Acrobat DC\Esl\Aiod.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Esl\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\Resource\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Adobe\Acrobat\Setup\{AC76BA86-1033-1033-7760-BC15014EA700}\Core.cab
COM executable for DOS
dropped
C:\Program Files\Common Files\Adobe\Acrobat\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Adobe\HelpCfg\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Services\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\ApiClient.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVCatalog.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVFileSystemMetadata.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIntegration.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvApi.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvStreamingManager.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvSubsystemController.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvSubsystems64_msix.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvVirtualization.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVManifest.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVPolicy.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVScripting.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32_msix.dll
OpenPGP Secret Key
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64_arm64x.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.bg-bg.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.cs-cz.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.el-gr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-gb.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.es-es.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.es-mx.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.et-ee.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fi-fi.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-ca.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.he-il.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hi-in.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hr-hr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hu-hu.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.id-id.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.it-it.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.kk-kz.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ko-kr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lt-lt.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lv-lv.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nl-nl.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-br.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ro-ro.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sk-sk.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sl-si.dll
DOS/MBR boot sector; partition 1 : ID=0xfc, active 0x86, start-CHS (0x68,190,36), end-CHS (0x22e,171,42), startsector 2841109973, 265638603 sectors; partition 2 : ID=0x35, active 0x81, start-CHS (0x2df,32,62), end-CHS (0x197,21,43), startsector 1685611882, 3921869146 sectors; partition 3 : ID=0x6e, active 0xb9, start-CHS (0x3fc,156,22), end-CHS (0x1ba,59,51), startsector 3807593581, 607417262 sectors; partition 4 : ID=0xaf, active 0xe3, start-CHS (0x14,76,36), end-CHS (0x2c3,66,36), startsector 612956039, 380113734 sectors, COM/EXE BootloaderB\244\303\207\367\210$F.\023\250\026
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sr-latn-rs.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sv-se.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.tr-tr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.uk-ua.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-tw.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RUI.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RCom.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeOEMPlugin.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll
OpenPGP Public Key
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-localization-l1-2-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-synch-l1-2-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-timezone-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-xstate-l2-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-conio-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-convert-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-filesystem-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-private-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-process-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-runtime-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-string-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe
PGP Secret Sub-key -
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\c2r32werhandler.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\c2r64werhandler.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\inventory.dll
OpenPGP Public Key
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\manageability.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\msix.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp140.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\officeinventory.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgr.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgrschedule.xml
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\offreg.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\policy.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ink\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Google\Chrome\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\SIGNUP\install.ins
data
dropped
C:\Program Files\Internet Explorer\SIGNUP\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\images\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\MSBuild\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe
data
dropped
C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe
data
dropped
C:\Program Files\Microsoft Office 15\ClientX64\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Microsoft\OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\application.ini
data
dropped
C:\Program Files\Mozilla Firefox\browser\crashreporter-override.ini
data
dropped
C:\Program Files\Mozilla Firefox\browser\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\browser\omni.ja
data
dropped
C:\Program Files\Mozilla Firefox\crashreporter.ini
data
dropped
C:\Program Files\Mozilla Firefox\defaultagent.ini
data
dropped
C:\Program Files\Mozilla Firefox\defaultagent_localized.ini
data
dropped
C:\Program Files\Mozilla Firefox\defaults\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\dependentlibs.list
data
dropped
C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml
data
dropped
C:\Program Files\Mozilla Firefox\firefox.exe.sig
data
dropped
C:\Program Files\Mozilla Firefox\fonts\TwemojiMozilla.ttf
data
dropped
C:\Program Files\Mozilla Firefox\fonts\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\gmp-clearkey\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\install.log
data
dropped
C:\Program Files\Mozilla Firefox\installation_telemetry.json
data
dropped
C:\Program Files\Mozilla Firefox\libGLESv2.dll
data
dropped
C:\Program Files\Mozilla Firefox\locale.ini
data
dropped
C:\Program Files\Mozilla Firefox\minidump-analyzer.exe
data
dropped
C:\Program Files\Mozilla Firefox\omni.ja
data
dropped
C:\Program Files\Mozilla Firefox\platform.ini
data
dropped
C:\Program Files\Mozilla Firefox\plugin-container.exe.sig
data
dropped
C:\Program Files\Mozilla Firefox\postSigningData
data
dropped
C:\Program Files\Mozilla Firefox\precomplete
OpenPGP Public Key
dropped
C:\Program Files\Mozilla Firefox\private_browsing.VisualElementsManifest.xml
data
dropped
C:\Program Files\Mozilla Firefox\removed-files
data
dropped
C:\Program Files\Mozilla Firefox\uninstall\helper.exe
data
dropped
C:\Program Files\Mozilla Firefox\uninstall\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini
data
dropped
C:\Program Files\Mozilla Firefox\uninstall\uninstall.log
data
dropped
C:\Program Files\Mozilla Firefox\update-settings.ini
data
dropped
C:\Program Files\Mozilla Firefox\updater.ini
data
dropped
C:\Program Files\Mozilla Firefox\xul.dll.sig
data
dropped
C:\Program Files\Mozilla Firefox\zoneIdProvenanceData
data
modified
C:\Program Files\Reference Assemblies\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender Advanced Threat Protection\Classification\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender Advanced Threat Protection\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\Offline\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\Platform\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Mail\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Media Renderer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Network Sharing\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Skins\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Visualizations\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Multimedia Platform\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\Accessories\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\TableTextService\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Photo Viewer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Photo Viewer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Portable Devices\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Security\BrowserCore\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Security\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\WindowsPowerShell\Modules\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\WindowsPowerShell\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\.curlrc
data
dropped
C:\ProgramData\Adobe\ARM\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft OneDrive\setup\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft OneDrive\setup\refcount.ini
data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\UpdateLock-308046B0AF4A39CB
data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_a835e6fe-8812-4ec1-84a7-0320cdb2934d.json
data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
data
dropped
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{D5D19E2F-7189-42FE-8103-92CD1FA457C2}v14.36.32532\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.549981C3F5F10_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.Getstarted_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.Microsoft3DViewer_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.MixedReality.Portal_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.Office.OneNote_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\SoftwareDistribution\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\USOShared\Logs\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\USOShared\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\WindowsHolographicDevices\SpatialStore\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\WindowsHolographicDevices\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\_curlrc
data
dropped
C:\ProgramData\dbg\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\regid.1991-06.com.microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
data
dropped
C:\ProgramData\ssh\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\AppData\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Desktop\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Documents\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Downloads\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Favorites\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Links\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Music\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\NTUSER.DAT
data
dropped
C:\Users\Default\OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Pictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Saved Games\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Videos\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\AccountPictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\Adobe Acrobat.lnk
data
dropped
C:\Users\Public\Desktop\Firefox.lnk
data
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
data
dropped
C:\Users\Public\Desktop\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Documents\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Downloads\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\RecordedTV.library-ms
data
dropped
C:\Users\Public\Libraries\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Pictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Videos\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\.curlrc
data
dropped
C:\Users\user\.ms-ad\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\3D Objects\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\2057\StructuredQuerySchema.bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{2135BB99-B905-4D30-88C9-B63C603DA134}.3.ver0x0000000000000001.db
dBase III DBT, version number 0, next free block index 423818, 1st item "ateTime"
dropped
C:\Users\user\AppData\Local\Temp\fkdjsadasd.ico
MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
dropped
C:\Users\user\AppData\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Contacts\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\AFWAAFRXKO.docx
data
dropped
C:\Users\user\Desktop\AIXACVYBSB.png
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO.mp3
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO.pdf
data
dropped
C:\Users\user\Desktop\Excel.lnk
data
dropped
C:\Users\user\Desktop\HTAGVDFUIE.mp3
data
dropped
C:\Users\user\Desktop\NHPKIZUUSG.jpg
data
dropped
C:\Users\user\Desktop\NHPKIZUUSG.xlsx
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU.jpg
data
dropped
C:\Users\user\Desktop\TQDGENUHWP.docx
data
dropped
C:\Users\user\Desktop\TQDGENUHWP.xlsx
data
dropped
C:\Users\user\Desktop\UMMBDNEQBN.png
data
dropped
C:\Users\user\Desktop\ZSSZYEFYMU.pdf
data
dropped
C:\Users\user\Desktop\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Documents\AFWAAFRXKO.docx
data
dropped
C:\Users\user\Documents\AIXACVYBSB.png
data
dropped
C:\Users\user\Documents\DTBZGIOOSO.mp3
data
dropped
C:\Users\user\Documents\DTBZGIOOSO.pdf
data
dropped
C:\Users\user\Documents\HTAGVDFUIE.mp3
data
dropped
C:\Users\user\Documents\NHPKIZUUSG.jpg
data
dropped
C:\Users\user\Documents\NHPKIZUUSG.xlsx
data
dropped
C:\Users\user\Documents\ONBQCLYSPU.jpg
data
dropped
C:\Users\user\Documents\TQDGENUHWP.docx
data
dropped
C:\Users\user\Documents\TQDGENUHWP.xlsx
data
dropped
C:\Users\user\Documents\UMMBDNEQBN.png
data
dropped
C:\Users\user\Documents\ZSSZYEFYMU.pdf
data
dropped
C:\Users\user\Documents\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Downloads\AFWAAFRXKO.docx
data
dropped
C:\Users\user\Downloads\AIXACVYBSB.png
data
dropped
C:\Users\user\Downloads\DTBZGIOOSO.mp3
data
dropped
C:\Users\user\Downloads\DTBZGIOOSO.pdf
data
dropped
C:\Users\user\Downloads\HTAGVDFUIE.mp3
data
dropped
C:\Users\user\Downloads\NHPKIZUUSG.jpg
data
dropped
C:\Users\user\Downloads\NHPKIZUUSG.xlsx
data
dropped
C:\Users\user\Downloads\ONBQCLYSPU.jpg
data
dropped
C:\Users\user\Downloads\TQDGENUHWP.docx
data
dropped
C:\Users\user\Downloads\TQDGENUHWP.xlsx
data
dropped
C:\Users\user\Downloads\UMMBDNEQBN.png
data
dropped
C:\Users\user\Downloads\ZSSZYEFYMU.pdf
data
dropped
C:\Users\user\Downloads\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Favorites\Amazon.url
data
dropped
C:\Users\user\Favorites\Bing.url
data
dropped
C:\Users\user\Favorites\Facebook.url
data
dropped
C:\Users\user\Favorites\Google.url
data
dropped
C:\Users\user\Favorites\Live.url
data
dropped
C:\Users\user\Favorites\NYTimes.url
data
dropped
C:\Users\user\Favorites\Reddit.url
data
dropped
C:\Users\user\Favorites\Twitter.url
data
dropped
C:\Users\user\Favorites\Wikipedia.url
data
dropped
C:\Users\user\Favorites\Youtube.url
data
dropped
C:\Users\user\Favorites\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Links\Desktop.lnk
data
dropped
C:\Users\user\Links\Downloads.lnk
data
dropped
C:\Users\user\Links\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Music\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Pictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Recent\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Saved Games\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Searches\Everywhere.search-ms
data
dropped
C:\Users\user\Searches\Indexed Locations.search-ms
data
dropped
C:\Users\user\Searches\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Searches\winrt--{S-1-5-21-2246122658-3693405117-2476756634-1003}-.searchconnector-ms
data
dropped
C:\Users\user\Videos\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\_curlrc
data
dropped
C:\Users\user\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
There are 895 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\goXq0JH6sn.exe
"C:\Users\user\Desktop\goXq0JH6sn.exe"
malicious
C:\Windows\SysWOW64\explorer.exe
explorer.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
malicious
C:\Windows\System32\vssadmin.exe
C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
malicious
C:\Windows\System32\ctfmon.exe
"ctfmon.exe"
malicious
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\SysWOW64\explorer.exe"
malicious
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\SysWOW64\explorer.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.torproject.org/
unknown
malicious
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
unknown
malicious
https://html.spec.whatwg.org/#flow-content-3
unknown
http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
unknown
https://w3c.github.io/mathml-core/#dfn-maction
unknown
https://developers.google.com/safe-browsing/v4/advisory
unknown
http://www.microsoft.co
unknown
https://design.firefox.com/photon/components/message-bars.html#type-specific-style
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
http://ocsp.RV
unknown
https://www.autoitscript.com/autoit3/
unknown
http://dev.w3.org/html5/spec/rendering.html#rendering
unknown
https://blocked.cdn.mozilla.net/%blockID%.html
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windows
unknown
https://mathiasbynens.be/notes/javascript-escapes#single
unknown
https://github.com/whatwg/html/issues/8610
unknown
https://github.com/lit/lit/issues/1266
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://firefox-source-docs.mozilla.org/performance/scroll-linked_effects.html
unknown
https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
unknown
https://mozilla-ohttp-fakespot.fastly-edge.com/
unknown
https://html.spec.whatwg.org/#the-hr-element-2
unknown
https://services.addons.mozilla.oN
unknown
https://w3c.github.io/mathml-core/#the-mathvariant-attribute
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTab
unknown
https://drafts.csswg.org/css-lists-3/#ua-stylesheet
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://mozilla.org0/
unknown
https://prod.oht
unknown
https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
unknown
https://api.accounts.firefox.com/v1
unknown
https://tc39.github.io/ecma262/#sec-typeof-operator
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
http://jsperf.com/code-review-1480
unknown
http://crl.microsoft.
unknown
https://%LOCALE%.malware-error.mozilla.com/?url=
unknown
https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
unknown
https://%LOCALE%.phish-report.mozilla.com/?url=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1607439
unknown
https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
unknown
http://detectportal.firefox.com/canonical.html
unknown
https://developers.google.c
unknown
https://github.com/microsoft/TypeScript/issues/338).
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
unknown
https://dap-02.api.divviup.org
unknown
https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1403293
unknown
http://www.ethiopic.org/Collation/OrderedLists.html.
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#E
unknown
https://extensionworkshop.com/documentation/publish/self-distribution/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://html.spec.whatwg.org/#the-details-and-summary-elements
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://xml.org/sax/features/namespaceshttp://xml.org/sax/features/namespace-prefixeshttp://xml.org/s
unknown
https://crbug.com/993268
unknown
https://webcompat.com/issues/new
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://helper1.dap.cloudflareresearch.com/v02
unknown
https://%LOCALE%.phish-error.mozilla.com/?url=
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://support.mozilla.org/kb/captive-portal
unknown
https://blocked.cdn.mozilla.net/
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://github.com/w3c/csswg-drafts/issues/1072
unknown
https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
unknown
https://developer.mozilla.org/en-US/docs/Mozilla/Tech/Places/Frecency_algorithm
unknown
https://tools.ietf.org/html/rfc7515#appendix-C)
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
unknown
https://mathiasbynens.be/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1592344
unknown
https://mathiasbynens.be/notes/javascript-encoding#surrogate-formulae
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://html.spec.whatwg.org/#bidi-rendering
unknown
http://file://sftldr.dllsftldr_wow64.dllIsProcessHookedAppVEntSubsystems32.dllAppVIsvSubsystems32.C
unknown
https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
unknown
http://mozilla.or$5
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1539075
unknown
https://datatracker.ietf.org/doc/html/rfc7515#section-4.1.5
unknown
https://drafts.csswg.org/css-scoping/#slots-in-shadow-tree
unknown
https://html.spec.whatwg.org/#hidden-elements
unknown
https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
unknown
http://mozilla.org
unknown
http://detectportal.firefox.com/success.txt?ipv6
unknown
https://github.com/mozilla-services/autograph/blob/main/signer/contentsignaturepki/README.md
unknown
https://developer.mozilla.org/docs/Web/API/Element/setPointerCapture
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
https://github.com/stylelint/stylelint/issues/6834
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryption
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
unknown
https://lit.dev/docs/templates/directives/#stylemap
unknown
https://webextensions.settings.services.mozilla.com/v1
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Skype
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.bhvkngxut\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\explorerframe.dll.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\explorerframe.dll.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\shell32.dll.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\shell32.dll.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
4A80000
direct allocation
page read and write
malicious
51FD000
heap
page read and write
5B0C000
heap
page read and write
5230000
heap
page read and write
5DE5000
heap
page read and write
3180000
heap
page read and write
31F2000
heap
page read and write
533D000
heap
page read and write
3188000
heap
page read and write
3149000
heap
page read and write
31F2000
heap
page read and write
3163000
heap
page read and write
318E000
heap
page read and write
5EE6000
heap
page read and write
318C000
heap
page read and write
3189000
heap
page read and write
5201000
heap
page read and write
31D9000
heap
page read and write
319C000
heap
page read and write
31A9000
heap
page read and write
52E0000
direct allocation
page read and write
52E0000
direct allocation
page read and write
31F2000
heap
page read and write
3180000
heap
page read and write
51FF000
heap
page read and write
5BD1000
heap
page read and write
31F3000
heap
page read and write
31D9000
heap
page read and write
3180000
heap
page read and write
5A9D000
heap
page read and write
3178000
heap
page read and write
31F3000
heap
page read and write
4B50000
direct allocation
page read and write
3181000
heap
page read and write
31AD000
heap
page read and write
4B40000
direct allocation
page read and write
5B7F000
heap
page read and write
53F0000
direct allocation
page read and write
31D5000
heap
page read and write
51E7000
heap
page read and write
31D0000
heap
page read and write
521E000
heap
page read and write
3147000
heap
page read and write
316B000
heap
page read and write
521A000
heap
page read and write
5AED000
heap
page read and write
5D5A000
heap
page read and write
3175000
heap
page read and write
3188000
heap
page read and write
3153000
heap
page read and write
5219000
heap
page read and write
4B50000
direct allocation
page read and write
51FD000
heap
page read and write
31FA000
heap
page read and write
317A000
heap
page read and write
31DA000
heap
page read and write
4B50000
direct allocation
page read and write
31FE000
heap
page read and write
31D0000
heap
page read and write
3188000
heap
page read and write
5B0F000
heap
page read and write
4B50000
direct allocation
page read and write
3240000
direct allocation
page read and write
31E9000
heap
page read and write
3153000
heap
page read and write
31A9000
heap
page read and write
3172000
heap
page read and write
31EA000
heap
page read and write
5211000
heap
page read and write
31E3000
heap
page read and write
315E000
heap
page read and write
31A1000
heap
page read and write
5B54000
heap
page read and write
3147000
heap
page read and write
318F000
heap
page read and write
314C000
heap
page read and write
31D3000
heap
page read and write
314C000
heap
page read and write
31E8000
heap
page read and write
3178000
heap
page read and write
31F2000
heap
page read and write
3153000
heap
page read and write
31FE000
heap
page read and write
6C5000
unkown
page write copy
34AE000
stack
page read and write
B10000
heap
page read and write
31F2000
heap
page read and write
5235000
heap
page read and write
317E000
heap
page read and write
3159000
heap
page read and write
31FE000
heap
page read and write
31A5000
heap
page read and write
31FE000
heap
page read and write
7BD000
stack
page read and write
31A9000
heap
page read and write
31D1000
heap
page read and write
51EE000
heap
page read and write
3192000
heap
page read and write
5210000
heap
page read and write
3184000
heap
page read and write
5200000
heap
page read and write
3171000
heap
page read and write
3180000
heap
page read and write
F5A06EB000
stack
page read and write
51EE000
heap
page read and write
5B14000
heap
page read and write
5E14000
heap
page read and write
52E0000
direct allocation
page read and write
31DA000
heap
page read and write
3143000
heap
page read and write
5201000
heap
page read and write
31FA000
heap
page read and write
165A1E29000
heap
page read and write
31F2000
heap
page read and write
5AB0000
heap
page read and write
3518000
heap
page read and write
5BF0000
heap
page read and write
3183000
heap
page read and write
5211000
heap
page read and write
31D7000
heap
page read and write
31FE000
heap
page read and write
31CE000
heap
page read and write
51FE000
heap
page read and write
31FA000
heap
page read and write
3191000
heap
page read and write
4B50000
direct allocation
page read and write
31D5000
heap
page read and write
5201000
heap
page read and write
31D7000
heap
page read and write
51E1000
heap
page read and write
31F7000
heap
page read and write
3187000
heap
page read and write
31F3000
heap
page read and write
31D9000
heap
page read and write
3180000
heap
page read and write
4B50000
direct allocation
page read and write
319E000
heap
page read and write
316E000
heap
page read and write
31FB000
heap
page read and write
31A9000
heap
page read and write
3159000
heap
page read and write
3171000
heap
page read and write
31F2000
heap
page read and write
51FE000
heap
page read and write
318F000
heap
page read and write
31DE000
heap
page read and write
317C000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
3143000
heap
page read and write
31E8000
heap
page read and write
4B50000
direct allocation
page read and write
5211000
heap
page read and write
31FE000
heap
page read and write
31D7000
heap
page read and write
3180000
heap
page read and write
31F7000
heap
page read and write
5211000
heap
page read and write
50C0000
heap
page read and write
31E5000
heap
page read and write
4B40000
direct allocation
page read and write
F7E000
stack
page read and write
31F3000
heap
page read and write
5224000
heap
page read and write
5B8E000
heap
page read and write
53F0000
direct allocation
page read and write
51F5000
heap
page read and write
521D000
heap
page read and write
5232000
heap
page read and write
31F2000
heap
page read and write
58BF000
stack
page read and write
31EB000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
31D4000
heap
page read and write
3176000
heap
page read and write
165A1BF0000
heap
page read and write
3178000
heap
page read and write
5228000
heap
page read and write
319A000
heap
page read and write
5224000
heap
page read and write
31F9000
heap
page read and write
520B000
heap
page read and write
51E0000
direct allocation
page read and write
31FA000
heap
page read and write
31EB000
heap
page read and write
4B50000
direct allocation
page read and write
3159000
heap
page read and write
3581000
heap
page read and write
52E0000
direct allocation
page read and write
51FF000
heap
page read and write
627F000
stack
page read and write
5228000
heap
page read and write
31D5000
heap
page read and write
2D50000
heap
page read and write
315E000
heap
page read and write
34FD000
heap
page read and write
318B000
heap
page read and write
5201000
heap
page read and write
3173000
heap
page read and write
52E0000
direct allocation
page read and write
319C000
heap
page read and write
5222000
heap
page read and write
318E000
heap
page read and write
5ADE000
heap
page read and write
5225000
heap
page read and write
31E2000
heap
page read and write
5228000
heap
page read and write
31D8000
heap
page read and write
31F2000
heap
page read and write
521B000
heap
page read and write
3188000
heap
page read and write
31F3000
heap
page read and write
5D03000
heap
page read and write
51E1000
heap
page read and write
2ADFB909000
heap
page read and write
31A9000
heap
page read and write
318B000
heap
page read and write
319E000
heap
page read and write
5A8D000
heap
page read and write
5212000
heap
page read and write
31FE000
heap
page read and write
314A000
heap
page read and write
31F3000
heap
page read and write
3167000
heap
page read and write
3180000
heap
page read and write
315E000
heap
page read and write
31F2000
heap
page read and write
5224000
heap
page read and write
3188000
heap
page read and write
3188000
heap
page read and write
31F2000
heap
page read and write
3178000
heap
page read and write
522C000
heap
page read and write
3163000
heap
page read and write
51F5000
heap
page read and write
3175000
heap
page read and write
31A5000
heap
page read and write
521E000
heap
page read and write
318B000
heap
page read and write
3193000
heap
page read and write
3190000
heap
page read and write
31FE000
heap
page read and write
5209000
heap
page read and write
5216000
heap
page read and write
4E08000
stack
page read and write
3194000
heap
page read and write
4B50000
direct allocation
page read and write
3155000
heap
page read and write
31F3000
heap
page read and write
165A3F74000
heap
page read and write
51FE000
heap
page read and write
52E0000
direct allocation
page read and write
520E000
heap
page read and write
3173000
heap
page read and write
5B12000
heap
page read and write
577E000
stack
page read and write
5AEF000
heap
page read and write
3184000
heap
page read and write
3502000
heap
page read and write
31F7000
heap
page read and write
3172000
heap
page read and write
5201000
heap
page read and write
4FAC000
heap
page read and write
3156000
heap
page read and write
342E000
stack
page read and write
4FA7000
heap
page read and write
3178000
heap
page read and write
31F2000
heap
page read and write
53D4000
heap
page read and write
5D79000
heap
page read and write
3185000
heap
page read and write
3192000
heap
page read and write
4B50000
direct allocation
page read and write
52E0000
direct allocation
page read and write
31F2000
heap
page read and write
5021000
heap
page read and write
5228000
heap
page read and write
31D0000
heap
page read and write
52E0000
direct allocation
page read and write
4B50000
direct allocation
page read and write
3178000
heap
page read and write
31A9000
heap
page read and write
31F3000
heap
page read and write
4B50000
direct allocation
page read and write
5CF0000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
315B000
heap
page read and write
165A4630000
heap
page read and write
316F000
heap
page read and write
5AF0000
heap
page read and write
31E9000
heap
page read and write
318F000
heap
page read and write
3138000
heap
page read and write
53F0000
direct allocation
page read and write
51FE000
heap
page read and write
5228000
heap
page read and write
31E8000
heap
page read and write
51FF000
heap
page read and write
5230000
heap
page read and write
3159000
heap
page read and write
51E6000
heap
page read and write
3180000
heap
page read and write
3158000
heap
page read and write
3172000
heap
page read and write
31F7000
heap
page read and write
31A9000
heap
page read and write
315B000
heap
page read and write
31F2000
heap
page read and write
31D1000
heap
page read and write
31F2000
heap
page read and write
5228000
heap
page read and write
7D0000
heap
page read and write
314D000
heap
page read and write
31F2000
heap
page read and write
31A5000
heap
page read and write
3175000
heap
page read and write
31F7000
heap
page read and write
5D37000
heap
page read and write
5211000
heap
page read and write
319F000
heap
page read and write
31D0000
heap
page read and write
31F2000
heap
page read and write
165A4720000
heap
page read and write
5E047FA000
stack
page read and write
5221000
heap
page read and write
314C000
heap
page read and write
520B000
heap
page read and write
3161000
heap
page read and write
318F000
heap
page read and write
316D000
heap
page read and write
3160000
heap
page read and write
2ADFBB60000
heap
page read and write
165A3F10000
heap
page read and write
314C000
heap
page read and write
31E6000
heap
page read and write
77B000
stack
page read and write
5DB1000
heap
page read and write
31D7000
heap
page read and write
2CFD000
stack
page read and write
3180000
heap
page read and write
3178000
heap
page read and write
31A9000
heap
page read and write
31F2000
heap
page read and write
3195000
heap
page read and write
314A000
heap
page read and write
31FE000
heap
page read and write
315E000
heap
page read and write
31F2000
heap
page read and write
52E0000
direct allocation
page read and write
31F5000
heap
page read and write
450000
unkown
page readonly
3175000
heap
page read and write
3155000
heap
page read and write
318A000
heap
page read and write
31D7000
heap
page read and write
52E0000
direct allocation
page read and write
3177000
heap
page read and write
52D0000
heap
page read and write
3149000
heap
page read and write
5EB5000
heap
page read and write
4B50000
direct allocation
page read and write
32D0000
heap
page read and write
31AC000
heap
page read and write
314A000
heap
page read and write
4B50000
direct allocation
page read and write
5AE4000
heap
page read and write
315A000
heap
page read and write
31F2000
heap
page read and write
316B000
heap
page read and write
3167000
heap
page read and write
31F2000
heap
page read and write
315A000
heap
page read and write
31A1000
heap
page read and write
5220000
heap
page read and write
51EE000
heap
page read and write
5221000
heap
page read and write
319C000
heap
page read and write
356D000
heap
page read and write
165A4790000
heap
page read and write
35E6000
heap
page read and write
53CB000
heap
page read and write
318E000
heap
page read and write
3149000
heap
page read and write
317D000
heap
page read and write
31F2000
heap
page read and write
31FA000
heap
page read and write
319D000
heap
page read and write
521D000
heap
page read and write
F5A07EF000
stack
page read and write
5A67000
heap
page read and write
3181000
heap
page read and write
31CE000
heap
page read and write
3175000
heap
page read and write
4B50000
direct allocation
page read and write
3180000
heap
page read and write
316F000
heap
page read and write
31F2000
heap
page read and write
5A8B000
heap
page read and write
5232000
heap
page read and write
52E0000
direct allocation
page read and write
4B40000
direct allocation
page read and write
51EA000
heap
page read and write
5D8D000
heap
page read and write
3188000
heap
page read and write
3155000
heap
page read and write
3189000
heap
page read and write
3149000
heap
page read and write
5B95000
heap
page read and write
5DFC000
heap
page read and write
31A5000
heap
page read and write
31FA000
heap
page read and write
319A000
heap
page read and write
3180000
heap
page read and write
51E1000
heap
page read and write
3149000
heap
page read and write
5C02000
heap
page read and write
632C000
stack
page read and write
31AC000
heap
page read and write
31A0000
heap
page read and write
3180000
heap
page read and write
51EA000
heap
page read and write
31F3000
heap
page read and write
3178000
heap
page read and write
4B50000
direct allocation
page read and write
52E0000
direct allocation
page read and write
3178000
heap
page read and write
521D000
heap
page read and write
3180000
heap
page read and write
31FE000
heap
page read and write
5AAA000
heap
page read and write
3175000
heap
page read and write
31F7000
heap
page read and write
31AD000
heap
page read and write
31F2000
heap
page read and write
31D3000
heap
page read and write
31D7000
heap
page read and write
31F2000
heap
page read and write
4FAE000
heap
page read and write
4B50000
direct allocation
page read and write
53F0000
direct allocation
page read and write
3180000
heap
page read and write
31F2000
heap
page read and write
5D4A000
heap
page read and write
318B000
heap
page read and write
31D7000
heap
page read and write
5C3A000
heap
page read and write
31A1000
heap
page read and write
31F2000
heap
page read and write
31F3000
heap
page read and write
51ED000
heap
page read and write
346E000
stack
page read and write
165A1DE0000
heap
page read and write
314F000
heap
page read and write
31E0000
heap
page read and write
3178000
heap
page read and write
31A2000
heap
page read and write
31F7000
heap
page read and write
314C000
heap
page read and write
521D000
heap
page read and write
3180000
heap
page read and write
3177000
heap
page read and write
3171000
heap
page read and write
5202000
heap
page read and write
4B50000
direct allocation
page read and write
3525000
heap
page read and write
3180000
heap
page read and write
520A000
heap
page read and write
31F2000
heap
page read and write
31A9000
heap
page read and write
51EE000
heap
page read and write
31E5000
heap
page read and write
5229000
heap
page read and write
31F2000
heap
page read and write
5222000
heap
page read and write
31AA000
heap
page read and write
3179000
heap
page read and write
672000
unkown
page readonly
3178000
heap
page read and write
5228000
heap
page read and write
31EB000
heap
page read and write
31FE000
heap
page read and write
3148000
heap
page read and write
31A2000
heap
page read and write
31EB000
heap
page read and write
31F2000
heap
page read and write
31A5000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
3184000
heap
page read and write
31FA000
heap
page read and write
3184000
heap
page read and write
3193000
heap
page read and write
3138000
heap
page read and write
31D4000
heap
page read and write
3184000
heap
page read and write
319C000
heap
page read and write
4B50000
direct allocation
page read and write
5B8F000
heap
page read and write
51ED000
heap
page read and write
31A9000
heap
page read and write
5DB3000
heap
page read and write
3176000
heap
page read and write
4B40000
direct allocation
page read and write
5D72000
heap
page read and write
31E0000
heap
page read and write
4B40000
direct allocation
page read and write
31FA000
heap
page read and write
5A62000
heap
page read and write
5B99000
heap
page read and write
5229000
heap
page read and write
3152000
heap
page read and write
521E000
heap
page read and write
51EA000
heap
page read and write
3166000
heap
page read and write
5B0B000
heap
page read and write
3182000
heap
page read and write
3180000
heap
page read and write
318D000
heap
page read and write
5C79000
heap
page read and write
3180000
heap
page read and write
5CBC000
heap
page read and write
5BCD000
heap
page read and write
31DA000
heap
page read and write
31A4000
heap
page read and write
318D000
heap
page read and write
31D2000
heap
page read and write
31D7000
heap
page read and write
52E0000
direct allocation
page read and write
31A9000
heap
page read and write
318C000
heap
page read and write
51FD000
heap
page read and write
5A78000
heap
page read and write
2C70000
heap
page read and write
4B50000
direct allocation
page read and write
3150000
heap
page read and write
31D8000
heap
page read and write
3176000
heap
page read and write
4B50000
direct allocation
page read and write
31A0000
heap
page read and write
3175000
heap
page read and write
3180000
heap
page read and write
319E000
heap
page read and write
31E8000
heap
page read and write
314A000
heap
page read and write
316E000
heap
page read and write
4B50000
direct allocation
page read and write
31E8000
heap
page read and write
5228000
heap
page read and write
31AA000
heap
page read and write
5228000
heap
page read and write
52E0000
direct allocation
page read and write
31FA000
heap
page read and write
3587000
heap
page read and write
3180000
heap
page read and write
5228000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
4B40000
direct allocation
page read and write
31A9000
heap
page read and write
5D70000
heap
page read and write
31DA000
heap
page read and write
3153000
heap
page read and write
51E9000
heap
page read and write
3180000
heap
page read and write
31F7000
heap
page read and write
31A3000
heap
page read and write
3180000
heap
page read and write
31F2000
heap
page read and write
5220000
heap
page read and write
3138000
heap
page read and write
3172000
heap
page read and write
317A000
heap
page read and write
5220000
heap
page read and write
31F8000
heap
page read and write
3172000
heap
page read and write
53A9000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
6CD000
unkown
page readonly
315F000
heap
page read and write
3180000
heap
page read and write
4B40000
direct allocation
page read and write
3175000
heap
page read and write
319B000
heap
page read and write
31DA000
heap
page read and write
3191000
heap
page read and write
31FE000
heap
page read and write
51FF000
heap
page read and write
319A000
heap
page read and write
5214000
heap
page read and write
5212000
heap
page read and write
3173000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
51EE000
heap
page read and write
4B40000
direct allocation
page read and write
318F000
heap
page read and write
5229000
heap
page read and write
318F000
heap
page read and write
314E000
heap
page read and write
317E000
heap
page read and write
165A3F81000
heap
page read and write
31A9000
heap
page read and write
31AA000
heap
page read and write
53C6000
heap
page read and write
5227000
heap
page read and write
31F2000
heap
page read and write
318F000
heap
page read and write
4B50000
direct allocation
page read and write
319D000
heap
page read and write
31FE000
heap
page read and write
5FF5000
heap
page read and write
31E8000
heap
page read and write
520E000
heap
page read and write
314C000
heap
page read and write
F5A0AFE000
stack
page read and write
4B50000
direct allocation
page read and write
31F2000
heap
page read and write
314F000
heap
page read and write
51FD000
heap
page read and write
31D4000
heap
page read and write
314A000
heap
page read and write
4B50000
direct allocation
page read and write
31F9000
heap
page read and write
5224000
heap
page read and write
316F000
heap
page read and write
5214000
heap
page read and write
51ED000
heap
page read and write
5B7E000
heap
page read and write
5BDD000
heap
page read and write
314E000
heap
page read and write
31E2000
heap
page read and write
3171000
heap
page read and write
31FE000
heap
page read and write
31F2000
heap
page read and write
5228000
heap
page read and write
5AF1000
heap
page read and write
5214000
heap
page read and write
502A000
heap
page read and write
31A2000
heap
page read and write
4B50000
direct allocation
page read and write
31A5000
heap
page read and write
31A9000
heap
page read and write
31D7000
heap
page read and write
32A6000
heap
page read and write
31F2000
heap
page read and write
315E000
heap
page read and write
31E5000
heap
page read and write
31A5000
heap
page read and write
31F2000
heap
page read and write
31A1000
heap
page read and write
315E000
heap
page read and write
3162000
heap
page read and write
31D3000
heap
page read and write
315C000
heap
page read and write
3182000
heap
page read and write
165A4610000
heap
page read and write
3147000
heap
page read and write
3188000
heap
page read and write
31E9000
heap
page read and write
51E1000
heap
page read and write
51FD000
heap
page read and write
3178000
heap
page read and write
3175000
heap
page read and write
31A4000
heap
page read and write
317C000
heap
page read and write
31EA000
heap
page read and write
5205000
heap
page read and write
5220000
heap
page read and write
5201000
heap
page read and write
5D71000
heap
page read and write
5217000
heap
page read and write
4B50000
direct allocation
page read and write
31F2000
heap
page read and write
318C000
heap
page read and write
31A9000
heap
page read and write
5235000
heap
page read and write
51FE000
heap
page read and write
5E26000
heap
page read and write
52E0000
direct allocation
page read and write
4B50000
direct allocation
page read and write
32A0000
heap
page read and write
51ED000
heap
page read and write
3157000
heap
page read and write
5215000
heap
page read and write
31E3000
heap
page read and write
3178000
heap
page read and write
31D1000
heap
page read and write
4B40000
direct allocation
page read and write
31F7000
heap
page read and write
31AA000
heap
page read and write
3194000
heap
page read and write
31E2000
heap
page read and write
2D65000
heap
page read and write
315B000
heap
page read and write
4B50000
direct allocation
page read and write
31F2000
heap
page read and write
3191000
heap
page read and write
3171000
heap
page read and write
3503000
heap
page read and write
3143000
heap
page read and write
31A9000
heap
page read and write
31EC000
heap
page read and write
521E000
heap
page read and write
31EB000
heap
page read and write
52E0000
direct allocation
page read and write
5E85000
heap
page read and write
315F000
heap
page read and write
5224000
heap
page read and write
31F2000
heap
page read and write
31AC000
heap
page read and write
31A9000
heap
page read and write
6037000
heap
page read and write
4B50000
direct allocation
page read and write
5201000
heap
page read and write
51FD000
heap
page read and write
319A000
heap
page read and write
3180000
heap
page read and write
3175000
heap
page read and write
3182000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
3179000
heap
page read and write
316B000
heap
page read and write
5209000
heap
page read and write
520E000
heap
page read and write
3230000
direct allocation
page read and write
31DA000
heap
page read and write
3167000
heap
page read and write
314D000
heap
page read and write
3175000
heap
page read and write
31DB000
heap
page read and write
521F000
heap
page read and write
5229000
heap
page read and write
318E000
heap
page read and write
5209000
heap
page read and write
315B000
heap
page read and write
5223000
heap
page read and write
314D000
heap
page read and write
5D70000
heap
page read and write
31F2000
heap
page read and write
5393000
heap
page read and write
31F7000
heap
page read and write
4B40000
direct allocation
page read and write
31F2000
heap
page read and write
318B000
heap
page read and write
5225000
heap
page read and write
3143000
heap
page read and write
5CAA000
heap
page read and write
31F3000
heap
page read and write
31A9000
heap
page read and write
583F000
stack
page read and write
3181000
heap
page read and write
31E6000
heap
page read and write
5D94000
heap
page read and write
3156000
heap
page read and write
3180000
heap
page read and write
3175000
heap
page read and write
314C000
heap
page read and write
51FF000
heap
page read and write
319C000
heap
page read and write
31A4000
heap
page read and write
5A95000
heap
page read and write
31D0000
heap
page read and write
5D8E000
heap
page read and write
3180000
heap
page read and write
31CE000
heap
page read and write
31A2000
heap
page read and write
31F2000
heap
page read and write
5202000
heap
page read and write
4B50000
direct allocation
page read and write
318C000
heap
page read and write
3171000
heap
page read and write
31A4000
heap
page read and write
3154000
heap
page read and write
31D5000
heap
page read and write
3180000
heap
page read and write
31AA000
heap
page read and write
5400000
direct allocation
page read and write
5ABE000
heap
page read and write
31F2000
heap
page read and write
3188000
heap
page read and write
5220000
heap
page read and write
31D4000
heap
page read and write
4B40000
direct allocation
page read and write
4B50000
direct allocation
page read and write
3180000
heap
page read and write
521D000
heap
page read and write
5212000
heap
page read and write
3175000
heap
page read and write
4FAE000
heap
page read and write
31F2000
heap
page read and write
51FD000
heap
page read and write
3184000
heap
page read and write
31FE000
heap
page read and write
31AC000
heap
page read and write
3175000
heap
page read and write
31E5000
heap
page read and write
31FA000
heap
page read and write
51FE000
heap
page read and write
318E000
heap
page read and write
3153000
heap
page read and write
5D48000
heap
page read and write
31E9000
heap
page read and write
5221000
heap
page read and write
318C000
heap
page read and write
318C000
heap
page read and write
51F4000
heap
page read and write
31F2000
heap
page read and write
317C000
heap
page read and write
31F2000
heap
page read and write
5228000
heap
page read and write
3160000
heap
page read and write
3175000
heap
page read and write
3190000
heap
page read and write
314C000
heap
page read and write
319D000
heap
page read and write
4B50000
direct allocation
page read and write
51E6000
heap
page read and write
51FA000
heap
page read and write
5228000
heap
page read and write
31D0000
heap
page read and write
318F000
heap
page read and write
318E000
heap
page read and write
520A000
heap
page read and write
318E000
heap
page read and write
31A9000
heap
page read and write
5E0497C000
stack
page read and write
3179000
heap
page read and write
4EA0000
heap
page read and write
4B50000
direct allocation
page read and write
5215000
heap
page read and write
521E000
heap
page read and write
31FB000
heap
page read and write
31F2000
heap
page read and write
3163000
heap
page read and write
5209000
heap
page read and write
31F2000
heap
page read and write
3180000
heap
page read and write
317D000
heap
page read and write
319A000
heap
page read and write
5DFC000
heap
page read and write
5BDD000
heap
page read and write
31FA000
heap
page read and write
31D9000
heap
page read and write
2ADFB928000
heap
page read and write
51EE000
heap
page read and write
5B39000
heap
page read and write
3147000
heap
page read and write
315F000
heap
page read and write
319E000
heap
page read and write
165A4740000
heap
page read and write
31FA000
heap
page read and write
3178000
heap
page read and write
3178000
heap
page read and write
31F2000
heap
page read and write
3175000
heap
page read and write
31A2000
heap
page read and write
5237000
heap
page read and write
3188000
heap
page read and write
31F5000
heap
page read and write
538A000
heap
page read and write
3138000
heap
page read and write
3180000
heap
page read and write
31A9000
heap
page read and write
31AA000
heap
page read and write
316B000
heap
page read and write
31D0000
heap
page read and write
3178000
heap
page read and write
3179000
heap
page read and write
315B000
heap
page read and write
31D7000
heap
page read and write
51FD000
heap
page read and write
4B50000
direct allocation
page read and write
3175000
heap
page read and write
51ED000
heap
page read and write
31E6000
heap
page read and write
350C000
heap
page read and write
4B50000
direct allocation
page read and write
316E000
heap
page read and write
31F2000
heap
page read and write
5DE5000
heap
page read and write
3153000
heap
page read and write
3189000
heap
page read and write
51FD000
heap
page read and write
3180000
heap
page read and write
5201000
heap
page read and write
314E000
heap
page read and write
31E8000
heap
page read and write
31FE000
heap
page read and write
5215000
heap
page read and write
31E5000
heap
page read and write
3176000
heap
page read and write
31FA000
heap
page read and write
3188000
heap
page read and write
4B50000
direct allocation
page read and write
4B50000
direct allocation
page read and write
314C000
heap
page read and write
4B40000
direct allocation
page read and write
31E0000
heap
page read and write
31A1000
heap
page read and write
3184000
heap
page read and write
31FE000
heap
page read and write
4B50000
direct allocation
page read and write
5218000
heap
page read and write
5E04879000
stack
page read and write
31A2000
heap
page read and write
5CBC000
heap
page read and write
31EA000
heap
page read and write
31E0000
heap
page read and write
53F0000
direct allocation
page read and write
318C000
heap
page read and write
319E000
heap
page read and write
31F6000
heap
page read and write
3178000
heap
page read and write
4B50000
direct allocation
page read and write
5224000
heap
page read and write
521E000
heap
page read and write
31EA000
heap
page read and write
51FF000
heap
page read and write
315B000
heap
page read and write
315F000
heap
page read and write
31E5000
heap
page read and write
5E14000
heap
page read and write
318F000
heap
page read and write
3182000
heap
page read and write
51E6000
heap
page read and write
316A000
heap
page read and write
318C000
heap
page read and write
31F2000
heap
page read and write
51ED000
heap
page read and write
51FE000
heap
page read and write
3179000
heap
page read and write
357C000
heap
page read and write
3188000
heap
page read and write
31F5000
heap
page read and write
5209000
heap
page read and write
31F2000
heap
page read and write
521E000
heap
page read and write
31F2000
heap
page read and write
3160000
heap
page read and write
3172000
heap
page read and write
3188000
heap
page read and write
51F2000
heap
page read and write
3554000
heap
page read and write
31A9000
heap
page read and write
31EB000
heap
page read and write
5228000
heap
page read and write
31F2000
heap
page read and write
31D1000
heap
page read and write
318A000
heap
page read and write
314A000
heap
page read and write
31DE000
heap
page read and write
4B50000
direct allocation
page read and write
31FA000
heap
page read and write
5B4F000
heap
page read and write
5AC7000
heap
page read and write
5A5F000
heap
page read and write
53F0000
direct allocation
page read and write
31E0000
heap
page read and write
52E0000
direct allocation
page read and write
3173000
heap
page read and write
316E000
heap
page read and write
31A1000
heap
page read and write
31DA000
heap
page read and write
4B40000
direct allocation
page read and write
4B50000
direct allocation
page read and write
3180000
heap
page read and write
31D7000
heap
page read and write
314A000
heap
page read and write
3188000
heap
page read and write
51E1000
heap
page read and write
3181000
heap
page read and write
4B50000
direct allocation
page read and write
31D0000
heap
page read and write
57FE000
stack
page read and write
51EA000
heap
page read and write
318C000
heap
page read and write
31F2000
heap
page read and write
3172000
heap
page read and write
5202000
heap
page read and write
31EA000
heap
page read and write
359C000
heap
page read and write
51FD000
heap
page read and write
3172000
heap
page read and write
31E8000
heap
page read and write
3178000
heap
page read and write
502C000
heap
page read and write
520A000
heap
page read and write
51FE000
heap
page read and write
4B50000
direct allocation
page read and write
31A3000
heap
page read and write
31E5000
heap
page read and write
31D4000
heap
page read and write
31A9000
heap
page read and write
319A000
heap
page read and write
31E2000
heap
page read and write
31F7000
heap
page read and write
5220000
heap
page read and write
31E3000
heap
page read and write
31DB000
heap
page read and write
31A7000
heap
page read and write
5228000
heap
page read and write
5216000
heap
page read and write
78B000
stack
page read and write
315C000
heap
page read and write
3153000
heap
page read and write
4DCB000
stack
page read and write
165A36E3000
heap
page read and write
31D9000
heap
page read and write
31F2000
heap
page read and write
31CE000
heap
page read and write
31A6000
heap
page read and write
51EA000
heap
page read and write
319E000
heap
page read and write
52E0000
direct allocation
page read and write
314E000
heap
page read and write
317B000
heap
page read and write
3189000
heap
page read and write
3156000
heap
page read and write
31E6000
heap
page read and write
356A000
heap
page read and write
5220000
heap
page read and write
5201000
heap
page read and write
351C000
heap
page read and write
318F000
heap
page read and write
51ED000
heap
page read and write
318F000
heap
page read and write
5205000
heap
page read and write
316D000
heap
page read and write
3175000
heap
page read and write
31F8000
heap
page read and write
3173000
heap
page read and write
31CE000
heap
page read and write
3156000
heap
page read and write
52E0000
direct allocation
page read and write
315D000
heap
page read and write
5201000
heap
page read and write
31F3000
heap
page read and write
51EA000
heap
page read and write
5D36000
heap
page read and write
314C000
heap
page read and write
52E0000
direct allocation
page read and write
3582000
heap
page read and write
4B50000
direct allocation
page read and write
3176000
heap
page read and write
3525000
heap
page read and write
4B50000
direct allocation
page read and write
6026000
heap
page read and write
3182000
heap
page read and write
5CAA000
heap
page read and write
520E000
heap
page read and write
31D7000
heap
page read and write
4B50000
direct allocation
page read and write
31E7000
heap
page read and write
3175000
heap
page read and write
3178000
heap
page read and write
318D000
heap
page read and write
31F7000
heap
page read and write
3154000
heap
page read and write
3157000
heap
page read and write
51E6000
heap
page read and write
314C000
heap
page read and write
5231000
heap
page read and write
314F000
heap
page read and write
31FA000
heap
page read and write
3143000
heap
page read and write
31FA000
heap
page read and write
51E6000
heap
page read and write
319C000
heap
page read and write
521E000
heap
page read and write
31D7000
heap
page read and write
5BF1000
heap
page read and write
31D3000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
31E5000
heap
page read and write
3180000
heap
page read and write
31A7000
heap
page read and write
31A8000
heap
page read and write
3147000
heap
page read and write
5A9C000
heap
page read and write
31D4000
heap
page read and write
3155000
heap
page read and write
3188000
heap
page read and write
5224000
heap
page read and write
2ADFB937000
heap
page read and write
31A9000
heap
page read and write
3172000
heap
page read and write
3157000
heap
page read and write
319A000
heap
page read and write
31FE000
heap
page read and write
5229000
heap
page read and write
3175000
heap
page read and write
3180000
heap
page read and write
5224000
heap
page read and write
31F3000
heap
page read and write
31D3000
heap
page read and write
3189000
heap
page read and write
318F000
heap
page read and write
314A000
heap
page read and write
5211000
heap
page read and write
31A9000
heap
page read and write
4B50000
direct allocation
page read and write
5B0D000
heap
page read and write
318C000
heap
page read and write
318F000
heap
page read and write
3230000
direct allocation
page read and write
31FE000
heap
page read and write
35EE000
heap
page read and write
3180000
heap
page read and write
521D000
heap
page read and write
319C000
heap
page read and write
3191000
heap
page read and write
314E000
heap
page read and write
3178000
heap
page read and write
3180000
heap
page read and write
31EA000
heap
page read and write
31A9000
heap
page read and write
31F5000
heap
page read and write
315E000
heap
page read and write
31AA000
heap
page read and write
31D3000
heap
page read and write
31F3000
heap
page read and write
31E0000
heap
page read and write
319A000
heap
page read and write
31EA000
heap
page read and write
318C000
heap
page read and write
3159000
heap
page read and write
31E0000
heap
page read and write
5BDD000
heap
page read and write
4B50000
direct allocation
page read and write
3172000
heap
page read and write
31D1000
heap
page read and write
31A1000
heap
page read and write
3175000
heap
page read and write
3180000
heap
page read and write
317D000
heap
page read and write
31A9000
heap
page read and write
319A000
heap
page read and write
3171000
heap
page read and write
51FE000
heap
page read and write
5220000
heap
page read and write
31A9000
heap
page read and write
521D000
heap
page read and write
5205000
heap
page read and write
52E0000
direct allocation
page read and write
3180000
heap
page read and write
4FA7000
heap
page read and write
51EE000
heap
page read and write
315A000
heap
page read and write
3180000
heap
page read and write
53CA000
heap
page read and write
3178000
heap
page read and write
314C000
heap
page read and write
5CBD000
heap
page read and write
2F54000
heap
page read and write
3180000
heap
page read and write
31A1000
heap
page read and write
3147000
heap
page read and write
31D6000
heap
page read and write
31F2000
heap
page read and write
3178000
heap
page read and write
31F2000
heap
page read and write
52E0000
direct allocation
page read and write
317C000
heap
page read and write
318A000
heap
page read and write
3173000
heap
page read and write
31E7000
heap
page read and write
3572000
heap
page read and write
4B50000
direct allocation
page read and write
5219000
heap
page read and write
3173000
heap
page read and write
4B50000
direct allocation
page read and write
3151000
heap
page read and write
5229000
heap
page read and write
31E9000
heap
page read and write
31E0000
heap
page read and write
3147000
heap
page read and write
5C62000
heap
page read and write
4B50000
direct allocation
page read and write
31A8000
heap
page read and write
165A4660000
heap
page read and write
5AAF000
heap
page read and write
5237000
heap
page read and write
3239000
stack
page read and write
52F0000
direct allocation
page read and write
51FE000
heap
page read and write
31E8000
heap
page read and write
502E000
heap
page read and write
3175000
heap
page read and write
31A2000
heap
page read and write
5ABE000
heap
page read and write
2760000
heap
page read and write
317C000
heap
page read and write
5F40000
heap
page read and write
52E0000
direct allocation
page read and write
5206000
heap
page read and write
31AC000
heap
page read and write
34FE000
heap
page read and write
5214000
heap
page read and write
3180000
heap
page read and write
3143000
heap
page read and write
31A9000
heap
page read and write
31D1000
heap
page read and write
165A1E25000
heap
page read and write
4B50000
direct allocation
page read and write
31D1000
heap
page read and write
31D7000
heap
page read and write
5D2B000
heap
page read and write
32D5000
heap
page read and write
3172000
heap
page read and write
319E000
heap
page read and write
31F2000
heap
page read and write
31E8000
heap
page read and write
3173000
heap
page read and write
31F2000
heap
page read and write
31FA000
heap
page read and write
31F2000
heap
page read and write
318F000
heap
page read and write
3150000
heap
page read and write
5224000
heap
page read and write
5AF0000
heap
page read and write
31F2000
heap
page read and write
315D000
heap
page read and write
31A3000
heap
page read and write
3184000
heap
page read and write
314D000
heap
page read and write
31E6000
heap
page read and write
31EB000
heap
page read and write
5C50000
heap
page read and write
318E000
heap
page read and write
3175000
heap
page read and write
31E6000
heap
page read and write
3159000
heap
page read and write
3159000
heap
page read and write
3230000
direct allocation
page read and write
3188000
heap
page read and write
31A1000
heap
page read and write
31A5000
heap
page read and write
4FC0000
heap
page read and write
6C3000
unkown
page write copy
5220000
heap
page read and write
5228000
heap
page read and write
3184000
heap
page read and write
31A8000
heap
page read and write
4B50000
direct allocation
page read and write
3177000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
4B40000
direct allocation
page read and write
31DB000
heap
page read and write
3500000
heap
page read and write
315E000
heap
page read and write
522D000
heap
page read and write
316E000
heap
page read and write
317A000
heap
page read and write
52E0000
direct allocation
page read and write
3147000
heap
page read and write
4B50000
direct allocation
page read and write
317A000
heap
page read and write
5220000
heap
page read and write
314C000
heap
page read and write
3191000
heap
page read and write
4B50000
direct allocation
page read and write
31F2000
heap
page read and write
520A000
heap
page read and write
31FD000
heap
page read and write
31A1000
heap
page read and write
34B0000
heap
page read and write
31F2000
heap
page read and write
31F3000
heap
page read and write
319A000
heap
page read and write
31F2000
heap
page read and write
51E1000
heap
page read and write
318D000
heap
page read and write
5AB3000
heap
page read and write
3143000
heap
page read and write
3175000
heap
page read and write
3175000
heap
page read and write
5211000
heap
page read and write
4B50000
direct allocation
page read and write
165A46B0000
heap
page read and write
5E26000
heap
page read and write
51E4000
heap
page read and write
319A000
heap
page read and write
4B50000
direct allocation
page read and write
5215000
heap
page read and write
521E000
heap
page read and write
165A4610000
heap
page read and write
31D9000
heap
page read and write
318F000
heap
page read and write
5D79000
heap
page read and write
6014000
heap
page read and write
316D000
heap
page read and write
4B50000
direct allocation
page read and write
3180000
heap
page read and write
3172000
heap
page read and write
31D9000
heap
page read and write
52E0000
direct allocation
page read and write
31D5000
heap
page read and write
31AA000
heap
page read and write
5AB3000
heap
page read and write
31DA000
heap
page read and write
3180000
heap
page read and write
31FE000
heap
page read and write
51E8000
heap
page read and write
31A1000
heap
page read and write
4B50000
direct allocation
page read and write
318C000
heap
page read and write
5218000
heap
page read and write
318C000
heap
page read and write
31E8000
heap
page read and write
3188000
heap
page read and write
31E3000
heap
page read and write
318C000
heap
page read and write
317C000
heap
page read and write
318E000
heap
page read and write
318C000
heap
page read and write
3180000
heap
page read and write
31AC000
heap
page read and write
318F000
heap
page read and write
31A7000
heap
page read and write
31AC000
heap
page read and write
31FE000
heap
page read and write
3176000
heap
page read and write
31FA000
heap
page read and write
5201000
heap
page read and write
31D0000
heap
page read and write
3149000
heap
page read and write
31A9000
heap
page read and write
3575000
heap
page read and write
3138000
heap
page read and write
31A9000
heap
page read and write
314D000
heap
page read and write
521D000
heap
page read and write
5A8E000
heap
page read and write
5DE4000
heap
page read and write
5207000
heap
page read and write
31A5000
heap
page read and write
5A81000
heap
page read and write
52E0000
direct allocation
page read and write
3157000
heap
page read and write
31A9000
heap
page read and write
31E0000
heap
page read and write
31D3000
heap
page read and write
3151000
heap
page read and write
318E000
heap
page read and write
521D000
heap
page read and write
316F000
heap
page read and write
4B50000
direct allocation
page read and write
3152000
heap
page read and write
3138000
heap
page read and write
35E0000
heap
page read and write
3143000
heap
page read and write
165A3F62000
heap
page read and write
315E000
heap
page read and write
31F3000
heap
page read and write
31AD000
heap
page read and write
318D000
heap
page read and write
3175000
heap
page read and write
5219000
heap
page read and write
520A000
heap
page read and write
31FA000
heap
page read and write
31A1000
heap
page read and write
31D6000
heap
page read and write
520D000
heap
page read and write
53F0000
direct allocation
page read and write
31D8000
heap
page read and write
3180000
heap
page read and write
319A000
heap
page read and write
31F3000
heap
page read and write
5219000
heap
page read and write
5E0433B000
stack
page read and write
5224000
heap
page read and write
5400000
direct allocation
page read and write
51EE000
heap
page read and write
31E6000
heap
page read and write
51FE000
heap
page read and write
3180000
heap
page read and write
4B50000
direct allocation
page read and write
3191000
heap
page read and write
4B50000
direct allocation
page read and write
30C0000
heap
page read and write
5224000
heap
page read and write
31FB000
heap
page read and write
5ECE000
heap
page read and write
5A98000
heap
page read and write
3172000
heap
page read and write
31DA000
heap
page read and write
2ADFB8B0000
heap
page read and write
3545000
heap
page read and write
53F0000
direct allocation
page read and write
31F7000
heap
page read and write
31A6000
heap
page read and write
5C91000
heap
page read and write
4B50000
direct allocation
page read and write
3180000
heap
page read and write
31F3000
heap
page read and write
165A46E0000
heap
page read and write
5B39000
heap
page read and write
52E0000
direct allocation
page read and write
B59000
heap
page read and write
500D000
heap
page read and write
3189000
heap
page read and write
3192000
heap
page read and write
319B000
heap
page read and write
31F2000
heap
page read and write
31FA000
heap
page read and write
31F2000
heap
page read and write
5224000
heap
page read and write
51FE000
heap
page read and write
51E1000
heap
page read and write
31CE000
heap
page read and write
3153000
heap
page read and write
31D6000
heap
page read and write
31A9000
heap
page read and write
31A5000
heap
page read and write
52E0000
direct allocation
page read and write
165A1BF6000
heap
page read and write
3159000
heap
page read and write
3158000
heap
page read and write
5DBB000
heap
page read and write
3172000
heap
page read and write
317E000
heap
page read and write
31A9000
heap
page read and write
31E9000
heap
page read and write
5E85000
heap
page read and write
3180000
heap
page read and write
31F7000
heap
page read and write
51FF000
heap
page read and write
52E0000
direct allocation
page read and write
5235000
heap
page read and write
51F8000
heap
page read and write
4B40000
direct allocation
page read and write
31A2000
heap
page read and write
165A4710000
heap
page read and write
3240000
direct allocation
page read and write
31A9000
heap
page read and write
319F000
heap
page read and write
3502000
heap
page read and write
3147000
heap
page read and write
5D18000
heap
page read and write
31CE000
heap
page read and write
31D7000
heap
page read and write
318C000
heap
page read and write
5215000
heap
page read and write
51ED000
heap
page read and write
52E0000
direct allocation
page read and write
3184000
heap
page read and write
3143000
heap
page read and write
4B50000
direct allocation
page read and write
51E1000
heap
page read and write
5B8F000
heap
page read and write
319E000
heap
page read and write
31EA000
heap
page read and write
31F2000
heap
page read and write
317B000
heap
page read and write
3138000
heap
page read and write
3189000
heap
page read and write
3175000
heap
page read and write
51F6000
heap
page read and write
4B50000
direct allocation
page read and write
3175000
heap
page read and write
319E000
heap
page read and write
5BC6000
heap
page read and write
31FA000
heap
page read and write
3178000
heap
page read and write
31AB000
heap
page read and write
319B000
heap
page read and write
3152000
heap
page read and write
31F2000
heap
page read and write
3154000
heap
page read and write
315E000
heap
page read and write
31FA000
heap
page read and write
3138000
heap
page read and write
314E000
heap
page read and write
2DAE000
unkown
page read and write
4B40000
direct allocation
page read and write
31F2000
heap
page read and write
3156000
heap
page read and write
4F0A000
heap
page read and write
53D1000
heap
page read and write
31E8000
heap
page read and write
3176000
heap
page read and write
3180000
heap
page read and write
5400000
direct allocation
page read and write
31F2000
heap
page read and write
31E3000
heap
page read and write
31FE000
heap
page read and write
316E000
heap
page read and write
31D7000
heap
page read and write
31FB000
heap
page read and write
3194000
heap
page read and write
31A9000
heap
page read and write
51FE000
heap
page read and write
5201000
heap
page read and write
3175000
heap
page read and write
319C000
heap
page read and write
31F2000
heap
page read and write
52F0000
direct allocation
page read and write
4B50000
direct allocation
page read and write
3154000
heap
page read and write
4EB0000
heap
page read and write
31A0000
heap
page read and write
31F2000
heap
page read and write
314E000
heap
page read and write
31DA000
heap
page read and write
165A45F0000
heap
page read and write
3240000
direct allocation
page read and write
5203000
heap
page read and write
3171000
heap
page read and write
52E0000
direct allocation
page read and write
31E6000
heap
page read and write
4B50000
direct allocation
page read and write
5DB1000
heap
page read and write
31F3000
heap
page read and write
31AA000
heap
page read and write
5209000
heap
page read and write
31F3000
heap
page read and write
31D7000
heap
page read and write
31E8000
heap
page read and write
316D000
heap
page read and write
165A36F0000
trusted library allocation
page read and write
5DF6000
heap
page read and write
31A3000
heap
page read and write
51EA000
heap
page read and write
52E0000
direct allocation
page read and write
4B50000
direct allocation
page read and write
3175000
heap
page read and write
5234000
heap
page read and write
31F5000
heap
page read and write
31AB000
heap
page read and write
318C000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
3180000
heap
page read and write
521C000
heap
page read and write
31EB000
heap
page read and write
51FD000
heap
page read and write
4B50000
direct allocation
page read and write
31A9000
heap
page read and write
31FA000
heap
page read and write
4B50000
direct allocation
page read and write
3192000
heap
page read and write
31D4000
heap
page read and write
5310000
heap
page read and write
3179000
heap
page read and write
3178000
heap
page read and write
316B000
heap
page read and write
52E0000
direct allocation
page read and write
51EF000
heap
page read and write
314E000
heap
page read and write
31A0000
heap
page read and write
314D000
heap
page read and write
2ADFB880000
heap
page read and write
314E000
heap
page read and write
5230000
heap
page read and write
31E3000
heap
page read and write
5201000
heap
page read and write
4B40000
direct allocation
page read and write
31E9000
heap
page read and write
3525000
heap
page read and write
34FF000
heap
page read and write
4B50000
direct allocation
page read and write
51ED000
heap
page read and write
5224000
heap
page read and write
31D6000
heap
page read and write
3171000
heap
page read and write
5E27000
heap
page read and write
5A9C000
heap
page read and write
323D000
stack
page read and write
5202000
heap
page read and write
3192000
heap
page read and write
316D000
heap
page read and write
5217000
heap
page read and write
5216000
heap
page read and write
3180000
heap
page read and write
318F000
heap
page read and write
5E9C000
heap
page read and write
31E0000
heap
page read and write
51FD000
heap
page read and write
3180000
heap
page read and write
3188000
heap
page read and write
5225000
heap
page read and write
5BCD000
heap
page read and write
315D000
heap
page read and write
51EF000
heap
page read and write
52E0000
direct allocation
page read and write
3185000
heap
page read and write
5D12000
heap
page read and write
3554000
heap
page read and write
4B50000
direct allocation
page read and write
314E000
heap
page read and write
319A000
heap
page read and write
31A9000
heap
page read and write
355D000
heap
page read and write
31F2000
heap
page read and write
51E8000
heap
page read and write
31D0000
heap
page read and write
51F4000
heap
page read and write
31F2000
heap
page read and write
52E0000
direct allocation
page read and write
3196000
heap
page read and write
4B50000
direct allocation
page read and write
3184000
heap
page read and write
3153000
heap
page read and write
31E0000
heap
page read and write
521E000
heap
page read and write
2DFE000
stack
page read and write
5219000
heap
page read and write
31D4000
heap
page read and write
5219000
heap
page read and write
317D000
heap
page read and write
31A5000
heap
page read and write
5E26000
heap
page read and write
3172000
heap
page read and write
3184000
heap
page read and write
31E0000
heap
page read and write
31A9000
heap
page read and write
4B50000
direct allocation
page read and write
165A46E0000
heap
page read and write
31FE000
heap
page read and write
31A9000
heap
page read and write
521D000
heap
page read and write
315B000
heap
page read and write
4B50000
direct allocation
page read and write
521D000
heap
page read and write
31F2000
heap
page read and write
31A9000
heap
page read and write
522C000
heap
page read and write
31F7000
heap
page read and write
5200000
heap
page read and write
3179000
heap
page read and write
3599000
heap
page read and write
3567000
heap
page read and write
52E0000
direct allocation
page read and write
31E7000
heap
page read and write
3172000
heap
page read and write
31A9000
heap
page read and write
3178000
heap
page read and write
5AF0000
heap
page read and write
31DE000
heap
page read and write
31A9000
heap
page read and write
5EE7000
heap
page read and write
5D13000
heap
page read and write
3138000
heap
page read and write
31F2000
heap
page read and write
2E10000
heap
page read and write
314E000
heap
page read and write
3191000
heap
page read and write
4B50000
direct allocation
page read and write
52E0000
direct allocation
page read and write
31F2000
heap
page read and write
51EA000
heap
page read and write
2ADFB900000
heap
page read and write
3178000
heap
page read and write
5224000
heap
page read and write
316A000
heap
page read and write
31A9000
heap
page read and write
5211000
heap
page read and write
31E6000
heap
page read and write
3176000
heap
page read and write
31E5000
heap
page read and write
522D000
heap
page read and write
4B40000
direct allocation
page read and write
31F2000
heap
page read and write
5220000
heap
page read and write
51E3000
heap
page read and write
31D2000
heap
page read and write
3147000
heap
page read and write
4B50000
direct allocation
page read and write
31A1000
heap
page read and write
5019000
heap
page read and write
5ABD000
heap
page read and write
31F2000
heap
page read and write
5228000
heap
page read and write
31E0000
heap
page read and write
4B50000
direct allocation
page read and write
3143000
heap
page read and write
319A000
heap
page read and write
3171000
heap
page read and write
31A5000
heap
page read and write
B30000
heap
page read and write
3230000
direct allocation
page read and write
31AA000
heap
page read and write
316B000
heap
page read and write
5217000
heap
page read and write
52E0000
direct allocation
page read and write
31FA000
heap
page read and write
31A1000
heap
page read and write
5211000
heap
page read and write
31E5000
heap
page read and write
4B50000
direct allocation
page read and write
31E9000
heap
page read and write
4B50000
direct allocation
page read and write
31F3000
heap
page read and write
3154000
heap
page read and write
31D3000
heap
page read and write
31D1000
heap
page read and write
51FD000
heap
page read and write
5B3B000
heap
page read and write
31E0000
heap
page read and write
31FA000
heap
page read and write
318F000
heap
page read and write
31F3000
heap
page read and write
57BF000
stack
page read and write
322F000
stack
page read and write
31F7000
heap
page read and write
3178000
heap
page read and write
5219000
heap
page read and write
314F000
heap
page read and write
3157000
heap
page read and write
51E4000
heap
page read and write
4B50000
direct allocation
page read and write
5206000
heap
page read and write
165A3F79000
heap
page read and write
3180000
heap
page read and write
29FD000
stack
page read and write
359C000
heap
page read and write
3138000
heap
page read and write
51E7000
heap
page read and write
31FE000
heap
page read and write
31A9000
heap
page read and write
4EB1000
heap
page read and write
5214000
heap
page read and write
165A45F0000
heap
page read and write
3171000
heap
page read and write
31F2000
heap
page read and write
52E0000
direct allocation
page read and write
5A9C000
heap
page read and write
521E000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
53DE000
heap
page read and write
3240000
direct allocation
page read and write
31A1000
heap
page read and write
3189000
heap
page read and write
316A000
heap
page read and write
31FA000
heap
page read and write
6C3000
unkown
page read and write
31A9000
heap
page read and write
31D1000
heap
page read and write
31A1000
heap
page read and write
52E0000
direct allocation
page read and write
31E8000
heap
page read and write
3180000
heap
page read and write
3147000
heap
page read and write
3192000
heap
page read and write
53C9000
heap
page read and write
31D0000
heap
page read and write
317F000
heap
page read and write
5224000
heap
page read and write
3175000
heap
page read and write
4B50000
direct allocation
page read and write
31A9000
heap
page read and write
6014000
heap
page read and write
4B50000
direct allocation
page read and write
318F000
heap
page read and write
31D6000
heap
page read and write
319C000
heap
page read and write
34FD000
heap
page read and write
318F000
heap
page read and write
5213000
heap
page read and write
4B50000
direct allocation
page read and write
31F3000
heap
page read and write
31FE000
heap
page read and write
31A2000
heap
page read and write
51FD000
heap
page read and write
358A000
heap
page read and write
520E000
heap
page read and write
31FE000
heap
page read and write
5E85000
heap
page read and write
316B000
heap
page read and write
52E0000
direct allocation
page read and write
2FFB000
stack
page read and write
3159000
heap
page read and write
5C7F000
heap
page read and write
5212000
heap
page read and write
5AF0000
heap
page read and write
5B0B000
heap
page read and write
31EA000
heap
page read and write
350C000
heap
page read and write
5225000
heap
page read and write
31E0000
heap
page read and write
5E3D000
heap
page read and write
5DB1000
heap
page read and write
31F2000
heap
page read and write
51FD000
heap
page read and write
316D000
heap
page read and write
52E0000
direct allocation
page read and write
3163000
heap
page read and write
31E8000
heap
page read and write
3162000
heap
page read and write
31A2000
heap
page read and write
31FB000
heap
page read and write
3548000
heap
page read and write
31A9000
heap
page read and write
3182000
heap
page read and write
3173000
heap
page read and write
31E6000
heap
page read and write
314D000
heap
page read and write
5E6D000
heap
page read and write
5211000
heap
page read and write
52E0000
direct allocation
page read and write
31A9000
heap
page read and write
353E000
heap
page read and write
31E5000
heap
page read and write
3191000
heap
page read and write
3588000
heap
page read and write
31AA000
heap
page read and write
5229000
heap
page read and write
312F000
unkown
page read and write
319C000
heap
page read and write
353E000
heap
page read and write
31DC000
heap
page read and write
31D6000
heap
page read and write
31CF000
heap
page read and write
3172000
heap
page read and write
52E0000
direct allocation
page read and write
3180000
heap
page read and write
51E1000
heap
page read and write
31F2000
heap
page read and write
31D7000
heap
page read and write
3171000
heap
page read and write
5B9C000
heap
page read and write
5B99000
heap
page read and write
3180000
heap
page read and write
31F3000
heap
page read and write
358E000
heap
page read and write
4B50000
direct allocation
page read and write
31F7000
heap
page read and write
31FE000
heap
page read and write
319F000
heap
page read and write
5228000
heap
page read and write
317A000
heap
page read and write
31D2000
heap
page read and write
316B000
heap
page read and write
52E0000
direct allocation
page read and write
318C000
heap
page read and write
3152000
heap
page read and write
5AF5000
heap
page read and write
31F2000
heap
page read and write
2D60000
heap
page read and write
623E000
stack
page read and write
31F2000
heap
page read and write
522C000
heap
page read and write
3153000
heap
page read and write
53F0000
direct allocation
page read and write
53D4000
heap
page read and write
3176000
heap
page read and write
31CF000
heap
page read and write
318C000
heap
page read and write
31A9000
heap
page read and write
359C000
heap
page read and write
31E8000
heap
page read and write
31A1000
heap
page read and write
5ADC000
heap
page read and write
31FA000
heap
page read and write
3179000
heap
page read and write
3154000
heap
page read and write
53F0000
direct allocation
page read and write
3153000
heap
page read and write
3175000
heap
page read and write
5DA7000
heap
page read and write
3159000
heap
page read and write
31F3000
heap
page read and write
52F0000
direct allocation
page read and write
31F2000
heap
page read and write
34FF000
heap
page read and write
5B66000
heap
page read and write
3158000
heap
page read and write
31D3000
heap
page read and write
5D12000
heap
page read and write
3172000
heap
page read and write
31F2000
heap
page read and write
51ED000
heap
page read and write
4B50000
direct allocation
page read and write
31FE000
heap
page read and write
5B3E000
heap
page read and write
5224000
heap
page read and write
3159000
heap
page read and write
5216000
heap
page read and write
31A1000
heap
page read and write
4B50000
direct allocation
page read and write
5E55000
heap
page read and write
4B50000
direct allocation
page read and write
31A7000
heap
page read and write
5207000
heap
page read and write
3196000
heap
page read and write
31D1000
heap
page read and write
31A4000
heap
page read and write
316A000
heap
page read and write
2D60000
heap
page read and write
31A9000
heap
page read and write
31DA000
heap
page read and write
6C8000
unkown
page read and write
52E0000
direct allocation
page read and write
5228000
heap
page read and write
31F2000
heap
page read and write
357C000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
31D0000
heap
page read and write
5220000
heap
page read and write
3159000
heap
page read and write
31F2000
heap
page read and write
3172000
heap
page read and write
5220000
heap
page read and write
51FE000
heap
page read and write
3152000
heap
page read and write
319A000
heap
page read and write
51E1000
heap
page read and write
31A4000
heap
page read and write
31DA000
heap
page read and write
31A3000
heap
page read and write
31E5000
heap
page read and write
31F2000
heap
page read and write
353D000
heap
page read and write
31F2000
heap
page read and write
31D7000
heap
page read and write
3181000
heap
page read and write
3181000
heap
page read and write
31A2000
heap
page read and write
521D000
heap
page read and write
31A1000
heap
page read and write
3159000
heap
page read and write
5205000
heap
page read and write
4B50000
direct allocation
page read and write
3171000
heap
page read and write
5209000
heap
page read and write
52E0000
direct allocation
page read and write
319C000
heap
page read and write
31DB000
heap
page read and write
4B50000
direct allocation
page read and write
61FF000
stack
page read and write
318F000
heap
page read and write
31EA000
heap
page read and write
31E6000
heap
page read and write
31CF000
heap
page read and write
4B50000
direct allocation
page read and write
3173000
heap
page read and write
5BD7000
heap
page read and write
31DE000
heap
page read and write
520D000
heap
page read and write
4B50000
direct allocation
page read and write
31F2000
heap
page read and write
318C000
heap
page read and write
319A000
heap
page read and write
318F000
heap
page read and write
E7D000
stack
page read and write
3192000
heap
page read and write
3172000
heap
page read and write
318E000
heap
page read and write
4B40000
direct allocation
page read and write
520F000
heap
page read and write
318C000
heap
page read and write
5222000
heap
page read and write
5208000
heap
page read and write
316B000
heap
page read and write
3178000
heap
page read and write
52E0000
direct allocation
page read and write
3176000
heap
page read and write
3180000
heap
page read and write
52E0000
direct allocation
page read and write
319B000
heap
page read and write
5224000
heap
page read and write
3190000
heap
page read and write
4B50000
direct allocation
page read and write
3197000
heap
page read and write
5D7C000
heap
page read and write
31DE000
heap
page read and write
31D2000
heap
page read and write
31D0000
heap
page read and write
3162000
heap
page read and write
3179000
heap
page read and write
F5A0A7F000
stack
page read and write
5224000
heap
page read and write
165A3EF0000
heap
page read and write
31FA000
heap
page read and write
52E0000
direct allocation
page read and write
31A9000
heap
page read and write
4B50000
direct allocation
page read and write
31EA000
heap
page read and write
3188000
heap
page read and write
53D3000
heap
page read and write
3171000
heap
page read and write
31DA000
heap
page read and write
31F2000
heap
page read and write
319C000
heap
page read and write
4B40000
direct allocation
page read and write
316E000
heap
page read and write
3549000
heap
page read and write
318F000
heap
page read and write
3147000
heap
page read and write
51E8000
heap
page read and write
3155000
heap
page read and write
4B50000
direct allocation
page read and write
31E6000
heap
page read and write
31FE000
heap
page read and write
31A2000
heap
page read and write
31E5000
heap
page read and write
51E1000
heap
page read and write
3189000
heap
page read and write
51EA000
heap
page read and write
617F000
stack
page read and write
3161000
heap
page read and write
4B50000
direct allocation
page read and write
3173000
heap
page read and write
3192000
heap
page read and write
31DE000
heap
page read and write
5220000
heap
page read and write
51F2000
heap
page read and write
5B39000
heap
page read and write
5228000
heap
page read and write
31F4000
heap
page read and write
3158000
heap
page read and write
314F000
heap
page read and write
31E3000
heap
page read and write
31FE000
heap
page read and write
3172000
heap
page read and write
4B50000
direct allocation
page read and write
3171000
heap
page read and write
31D3000
heap
page read and write
3147000
heap
page read and write
5B6C000
heap
page read and write
31E0000
heap
page read and write
31A3000
heap
page read and write
521D000
heap
page read and write
3180000
heap
page read and write
31DE000
heap
page read and write
5CD0000
heap
page read and write
5ABE000
heap
page read and write
31A9000
heap
page read and write
3147000
heap
page read and write
520D000
heap
page read and write
3180000
heap
page read and write
521E000
heap
page read and write
51E1000
heap
page read and write
51EA000
heap
page read and write
5200000
heap
page read and write
4B40000
direct allocation
page read and write
4B50000
direct allocation
page read and write
31A2000
heap
page read and write
51E6000
heap
page read and write
4E10000
heap
page read and write
5224000
heap
page read and write
3150000
heap
page read and write
31E0000
heap
page read and write
3151000
heap
page read and write
3171000
heap
page read and write
31A6000
heap
page read and write
314C000
heap
page read and write
53BC000
heap
page read and write
31F2000
heap
page read and write
31F2000
heap
page read and write
521D000
heap
page read and write
315B000
heap
page read and write
3180000
heap
page read and write
3150000
heap
page read and write
3180000
heap
page read and write
4B50000
direct allocation
page read and write
31A3000
heap
page read and write
2F56000
heap
page read and write
52E0000
direct allocation
page read and write
314F000
heap
page read and write
31D6000
heap
page read and write
31AC000
heap
page read and write
31F7000
heap
page read and write
59E0000
heap
page read and write
4B50000
direct allocation
page read and write
3171000
heap
page read and write
3149000
heap
page read and write
52E0000
direct allocation
page read and write
3154000
heap
page read and write
31A9000
heap
page read and write
3194000
heap
page read and write
3152000
heap
page read and write
522D000
heap
page read and write
3182000
heap
page read and write
3177000
heap
page read and write
5216000
heap
page read and write
451000
unkown
page execute read
3184000
heap
page read and write
315F000
heap
page read and write
521D000
heap
page read and write
31FE000
heap
page read and write
31F3000
heap
page read and write
5219000
heap
page read and write
31AC000
heap
page read and write
4B50000
direct allocation
page read and write
31D4000
heap
page read and write
5205000
heap
page read and write
31F6000
heap
page read and write
318A000
heap
page read and write
3183000
heap
page read and write
4B50000
direct allocation
page read and write
319A000
heap
page read and write
4B40000
direct allocation
page read and write
5220000
heap
page read and write
31F2000
heap
page read and write
3173000
heap
page read and write
3180000
heap
page read and write
2890000
heap
page read and write
314C000
heap
page read and write
521E000
heap
page read and write
672000
unkown
page readonly
31A9000
heap
page read and write
520A000
heap
page read and write
3158000
heap
page read and write
3178000
heap
page read and write
4B50000
direct allocation
page read and write
521D000
heap
page read and write
31F2000
heap
page read and write
318C000
heap
page read and write
4B50000
direct allocation
page read and write
31D5000
heap
page read and write
51EA000
heap
page read and write
3189000
heap
page read and write
31F2000
heap
page read and write
B3A000
heap
page read and write
5BDB000
heap
page read and write
318F000
heap
page read and write
3181000
heap
page read and write
3185000
heap
page read and write
315F000
heap
page read and write
31E8000
heap
page read and write
5E04877000
stack
page read and write
31AC000
heap
page read and write
53BE000
heap
page read and write
3149000
heap
page read and write
51FD000
heap
page read and write
314B000
heap
page read and write
52E0000
direct allocation
page read and write
319B000
heap
page read and write
318F000
heap
page read and write
3158000
heap
page read and write
4B50000
direct allocation
page read and write
3190000
heap
page read and write
4B50000
direct allocation
page read and write
5C91000
heap
page read and write
31A0000
heap
page read and write
31E5000
heap
page read and write
358B000
heap
page read and write
5AF2000
heap
page read and write
51EE000
heap
page read and write
50C2000
heap
page read and write
31F2000
heap
page read and write
3175000
heap
page read and write
521D000
heap
page read and write
5FF0000
heap
page read and write
165A1BD0000
heap
page read and write
3178000
heap
page read and write
53F0000
direct allocation
page read and write
3153000
heap
page read and write
31F2000
heap
page read and write
31A9000
heap
page read and write
F5A076F000
stack
page read and write
3175000
heap
page read and write
31A9000
heap
page read and write
3155000
heap
page read and write
31FA000
heap
page read and write
52E0000
direct allocation
page read and write
31A9000
heap
page read and write
3188000
heap
page read and write
31FA000
heap
page read and write
31A5000
heap
page read and write
3178000
heap
page read and write
31E0000
heap
page read and write
31FE000
heap
page read and write
5ECE000
heap
page read and write
31FE000
heap
page read and write
D3E000
stack
page read and write
5C4D000
heap
page read and write
318C000
heap
page read and write
5C25000
heap
page read and write
31FD000
heap
page read and write
3147000
heap
page read and write
31A3000
heap
page read and write
51EA000
heap
page read and write
3176000
heap
page read and write
2DAD000
stack
page read and write
31F3000
heap
page read and write
3171000
heap
page read and write
3189000
heap
page read and write
3178000
heap
page read and write
31F3000
heap
page read and write
317C000
heap
page read and write
31AA000
heap
page read and write
3149000
heap
page read and write
318F000
heap
page read and write
31D2000
heap
page read and write
314D000
heap
page read and write
31E9000
heap
page read and write
3183000
heap
page read and write
4F80000
heap
page read and write
31FA000
heap
page read and write
31A2000
heap
page read and write
3180000
heap
page read and write
3175000
heap
page read and write
3153000
heap
page read and write
3180000
heap
page read and write
4B50000
direct allocation
page read and write
3171000
heap
page read and write
51E1000
heap
page read and write
52E0000
heap
page read and write
31E8000
heap
page read and write
3153000
heap
page read and write
51F5000
heap
page read and write
3188000
heap
page read and write
31FA000
heap
page read and write
51F5000
heap
page read and write
319B000
heap
page read and write
5235000
heap
page read and write
31E3000
heap
page read and write
3570000
heap
page read and write
31A9000
heap
page read and write
3188000
heap
page read and write
31FE000
heap
page read and write
3176000
heap
page read and write
318E000
heap
page read and write
3167000
heap
page read and write
3180000
heap
page read and write
316E000
heap
page read and write
51E7000
heap
page read and write
31E6000
heap
page read and write
319D000
heap
page read and write
3179000
heap
page read and write
314C000
heap
page read and write
3167000
heap
page read and write
3159000
heap
page read and write
539C000
heap
page read and write
316B000
heap
page read and write
5D04000
heap
page read and write
3184000
heap
page read and write
315B000
heap
page read and write
3178000
heap
page read and write
5A61000
heap
page read and write
31D3000
heap
page read and write
51E6000
heap
page read and write
2ADFB92B000
heap
page read and write
318B000
heap
page read and write
5220000
heap
page read and write
3158000
heap
page read and write
51EA000
heap
page read and write
3166000
heap
page read and write
319A000
heap
page read and write
5218000
heap
page read and write
51E6000
heap
page read and write
3185000
heap
page read and write
31F2000
heap
page read and write
5AC0000
heap
page read and write
315A000
heap
page read and write
315F000
heap
page read and write
5C22000
heap
page read and write
31A9000
heap
page read and write
5AB2000
heap
page read and write
31F2000
heap
page read and write
521D000
heap
page read and write
3154000
heap
page read and write
5BBD000
heap
page read and write
5B8A000
heap
page read and write
2F53000
heap
page read and write
3195000
heap
page read and write
5D02000
heap
page read and write
5224000
heap
page read and write
315E000
heap
page read and write
5224000
heap
page read and write
31E9000
heap
page read and write
31FB000
heap
page read and write
31D7000
heap
page read and write
31F2000
heap
page read and write
B00000
heap
page read and write
31A9000
heap
page read and write
318A000
heap
page read and write
51F8000
heap
page read and write
5AB4000
heap
page read and write
31A9000
heap
page read and write
314C000
heap
page read and write
3156000
heap
page read and write
316F000
heap
page read and write
31AC000
heap
page read and write
3159000
heap
page read and write
51EE000
heap
page read and write
3163000
heap
page read and write
165A1DC0000
heap
page read and write
52F0000
direct allocation
page read and write
31DE000
heap
page read and write
3180000
heap
page read and write
31AA000
heap
page read and write
32B0000
heap
page read and write
31FA000
heap
page read and write
3196000
heap
page read and write
31FA000
heap
page read and write
3180000
heap
page read and write
5219000
heap
page read and write
31A9000
heap
page read and write
3163000
heap
page read and write
5B6A000
heap
page read and write
318C000
heap
page read and write
51E1000
heap
page read and write
31A9000
heap
page read and write
318C000
heap
page read and write
3159000
heap
page read and write
5228000
heap
page read and write
3178000
heap
page read and write
4B40000
direct allocation
page read and write
53F0000
direct allocation
page read and write
3180000
heap
page read and write
52E0000
direct allocation
page read and write
521E000
heap
page read and write
4B40000
direct allocation
page read and write
4FAC000
heap
page read and write
52E0000
direct allocation
page read and write
3154000
heap
page read and write
31A9000
heap
page read and write
5224000
heap
page read and write
3189000
heap
page read and write
3172000
heap
page read and write
5C62000
heap
page read and write
3189000
heap
page read and write
31A9000
heap
page read and write
539F000
heap
page read and write
3178000
heap
page read and write
4B50000
direct allocation
page read and write
31F2000
heap
page read and write
52E0000
direct allocation
page read and write
350A000
heap
page read and write
52E0000
direct allocation
page read and write
31D1000
heap
page read and write
5217000
heap
page read and write
51EA000
heap
page read and write
314C000
heap
page read and write
3178000
heap
page read and write
3180000
heap
page read and write
5201000
heap
page read and write
31F8000
heap
page read and write
521A000
heap
page read and write
3178000
heap
page read and write
31F2000
heap
page read and write
31FE000
heap
page read and write
5228000
heap
page read and write
5BAB000
heap
page read and write
5224000
heap
page read and write
3180000
heap
page read and write
319A000
heap
page read and write
31E5000
heap
page read and write
50CB000
heap
page read and write
3171000
heap
page read and write
5220000
heap
page read and write
5220000
heap
page read and write
318C000
heap
page read and write
316B000
heap
page read and write
3179000
heap
page read and write
31E8000
heap
page read and write
314C000
heap
page read and write
4B40000
direct allocation
page read and write
31A5000
heap
page read and write
2790000
heap
page read and write
33EE000
stack
page read and write
31FA000
heap
page read and write
31F2000
heap
page read and write
314C000
heap
page read and write
317B000
heap
page read and write
31F2000
heap
page read and write
52E0000
direct allocation
page read and write
4B40000
direct allocation
page read and write
31FE000
heap
page read and write
5C61000
heap
page read and write
450000
unkown
page readonly
31FE000
heap
page read and write
319D000
heap
page read and write
51FD000
heap
page read and write
31A4000
heap
page read and write
31FE000
heap
page read and write
31A9000
heap
page read and write
318C000
heap
page read and write
4B50000
direct allocation
page read and write
3178000
heap
page read and write
3178000
heap
page read and write
31E0000
heap
page read and write
31EC000
heap
page read and write
313C000
heap
page read and write
3171000
heap
page read and write
3181000
heap
page read and write
3181000
heap
page read and write
31A9000
heap
page read and write
3173000
heap
page read and write
51FD000
heap
page read and write
5C02000
heap
page read and write
4B50000
direct allocation
page read and write
5E049FD000
stack
page read and write
53D4000
heap
page read and write
52E0000
direct allocation
page read and write
52F0000
direct allocation
page read and write
5235000
heap
page read and write
31DA000
heap
page read and write
53F0000
direct allocation
page read and write
319A000
heap
page read and write
521D000
heap
page read and write
6005000
heap
page read and write
31EB000
heap
page read and write
5B99000
heap
page read and write
317D000
heap
page read and write
3184000
heap
page read and write
5E9C000
heap
page read and write
31F2000
heap
page read and write
3240000
direct allocation
page read and write
5A8F000
heap
page read and write
5225000
heap
page read and write
31FB000
heap
page read and write
4B50000
direct allocation
page read and write
31FA000
heap
page read and write
31D6000
heap
page read and write
317E000
heap
page read and write
31A4000
heap
page read and write
5215000
heap
page read and write
314C000
heap
page read and write
5AC4000
heap
page read and write
51E1000
heap
page read and write
31E6000
heap
page read and write
31FA000
heap
page read and write
31F3000
heap
page read and write
31E9000
heap
page read and write
31E0000
heap
page read and write
3175000
heap
page read and write
31D1000
heap
page read and write
31FB000
heap
page read and write
316A000
heap
page read and write
4B40000
direct allocation
page read and write
2780000
heap
page read and write
31FE000
heap
page read and write
3173000
heap
page read and write
315D000
heap
page read and write
303E000
stack
page read and write
520A000
heap
page read and write
31A9000
heap
page read and write
31D4000
heap
page read and write
52E0000
direct allocation
page read and write
587E000
stack
page read and write
315F000
heap
page read and write
3147000
heap
page read and write
5212000
heap
page read and write
5D05000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
3192000
heap
page read and write
5BD7000
heap
page read and write
31F2000
heap
page read and write
319A000
heap
page read and write
3143000
heap
page read and write
31EB000
heap
page read and write
4B50000
direct allocation
page read and write
5CD0000
heap
page read and write
2DB0000
heap
page read and write
31D9000
heap
page read and write
521D000
heap
page read and write
31F2000
heap
page read and write
319D000
heap
page read and write
31A7000
heap
page read and write
3157000
heap
page read and write
5228000
heap
page read and write
5228000
heap
page read and write
31A1000
heap
page read and write
3180000
heap
page read and write
51FF000
heap
page read and write
3171000
heap
page read and write
31DE000
heap
page read and write
314E000
heap
page read and write
51FD000
heap
page read and write
3180000
heap
page read and write
5205000
heap
page read and write
357A000
heap
page read and write
3150000
heap
page read and write
31D9000
heap
page read and write
51E6000
heap
page read and write
5A9C000
heap
page read and write
AFC000
stack
page read and write
3180000
heap
page read and write
31DE000
heap
page read and write
5C64000
heap
page read and write
3173000
heap
page read and write
3178000
heap
page read and write
521D000
heap
page read and write
52F0000
direct allocation
page read and write
4B50000
direct allocation
page read and write
4B40000
direct allocation
page read and write
3162000
heap
page read and write
319E000
heap
page read and write
31F2000
heap
page read and write
5D12000
heap
page read and write
31E0000
heap
page read and write
31A1000
heap
page read and write
2F30000
heap
page read and write
3154000
heap
page read and write
5200000
heap
page read and write
5E0477D000
stack
page read and write
316B000
heap
page read and write
3188000
heap
page read and write
31EA000
heap
page read and write
31D4000
heap
page read and write
5400000
direct allocation
page read and write
31F2000
heap
page read and write
31F8000
heap
page read and write
5DA7000
heap
page read and write
4B50000
direct allocation
page read and write
31F8000
heap
page read and write
31F2000
heap
page read and write
316C000
heap
page read and write
165A3F68000
heap
page read and write
5D12000
heap
page read and write
31F3000
heap
page read and write
31E9000
heap
page read and write
315D000
heap
page read and write
5214000
heap
page read and write
31DE000
heap
page read and write
31FA000
heap
page read and write
4B50000
direct allocation
page read and write
314E000
heap
page read and write
31FA000
heap
page read and write
5C7F000
heap
page read and write
3157000
heap
page read and write
31AC000
heap
page read and write
5212000
heap
page read and write
31FE000
heap
page read and write
31E6000
heap
page read and write
5D03000
heap
page read and write
61BE000
stack
page read and write
31E9000
heap
page read and write
31E5000
heap
page read and write
5228000
heap
page read and write
5C77000
heap
page read and write
5C77000
heap
page read and write
6CA000
unkown
page read and write
5AED000
heap
page read and write
31D1000
heap
page read and write
5200000
heap
page read and write
4B40000
direct allocation
page read and write
4B50000
direct allocation
page read and write
4B50000
direct allocation
page read and write
5218000
heap
page read and write
5218000
heap
page read and write
52E0000
direct allocation
page read and write
31E0000
heap
page read and write
4B50000
direct allocation
page read and write
51EA000
heap
page read and write
31F8000
heap
page read and write
318C000
heap
page read and write
3176000
heap
page read and write
5229000
heap
page read and write
31F3000
heap
page read and write
31F2000
heap
page read and write
5B11000
heap
page read and write
5A8D000
heap
page read and write
5F64000
heap
page read and write
2F3D000
heap
page read and write
3180000
heap
page read and write
4B50000
direct allocation
page read and write
31F3000
heap
page read and write
318C000
heap
page read and write
4B50000
direct allocation
page read and write
31F5000
heap
page read and write
3147000
heap
page read and write
3156000
heap
page read and write
4B50000
direct allocation
page read and write
3197000
heap
page read and write
52E0000
direct allocation
page read and write
5219000
heap
page read and write
3175000
heap
page read and write
31A9000
heap
page read and write
31F3000
heap
page read and write
319D000
heap
page read and write
3173000
heap
page read and write
5205000
heap
page read and write
31EC000
heap
page read and write
5D01000
heap
page read and write
319C000
heap
page read and write
5201000
heap
page read and write
3191000
heap
page read and write
5217000
heap
page read and write
4B50000
direct allocation
page read and write
31AB000
heap
page read and write
31E7000
heap
page read and write
5224000
heap
page read and write
3176000
heap
page read and write
52E0000
direct allocation
page read and write
314E000
heap
page read and write
4B40000
direct allocation
page read and write
3240000
heap
page read and write
31D3000
heap
page read and write
5C3B000
heap
page read and write
3152000
heap
page read and write
31FB000
heap
page read and write
3175000
heap
page read and write
51F5000
heap
page read and write
315E000
heap
page read and write
3189000
heap
page read and write
53D6000
heap
page read and write
31D2000
heap
page read and write
5A7F000
heap
page read and write
4B40000
direct allocation
page read and write
31A9000
heap
page read and write
3194000
heap
page read and write
3156000
heap
page read and write
31A9000
heap
page read and write
31AA000
heap
page read and write
3137000
heap
page read and write
31A0000
heap
page read and write
5221000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
3579000
heap
page read and write
5224000
heap
page read and write
31E3000
heap
page read and write
31F2000
heap
page read and write
315D000
heap
page read and write
5B04000
heap
page read and write
51ED000
heap
page read and write
3182000
heap
page read and write
318A000
heap
page read and write
5224000
heap
page read and write
31D7000
heap
page read and write
5038000
heap
page read and write
5E0486C000
stack
page read and write
31F2000
heap
page read and write
2ADFBB65000
heap
page read and write
31F3000
heap
page read and write
31D1000
heap
page read and write
521D000
heap
page read and write
31A9000
heap
page read and write
51FE000
heap
page read and write
31F2000
heap
page read and write
31A2000
heap
page read and write
5205000
heap
page read and write
5A67000
heap
page read and write
5200000
heap
page read and write
5224000
heap
page read and write
4B50000
direct allocation
page read and write
314C000
heap
page read and write
51FE000
heap
page read and write
31FE000
heap
page read and write
53F0000
direct allocation
page read and write
3175000
heap
page read and write
3153000
heap
page read and write
3178000
heap
page read and write
31F2000
heap
page read and write
51FE000
heap
page read and write
316A000
heap
page read and write
31FC000
heap
page read and write
31F2000
heap
page read and write
3191000
heap
page read and write
30C8000
heap
page read and write
5D70000
heap
page read and write
31E8000
heap
page read and write
3240000
direct allocation
page read and write
51ED000
heap
page read and write
31DA000
heap
page read and write
31D4000
heap
page read and write
E3F000
stack
page read and write
5DBD000
heap
page read and write
3179000
heap
page read and write
318A000
heap
page read and write
52E0000
direct allocation
page read and write
5EE6000
heap
page read and write
316A000
heap
page read and write
316E000
heap
page read and write
5228000
heap
page read and write
318F000
heap
page read and write
31E6000
heap
page read and write
521E000
heap
page read and write
31FA000
heap
page read and write
521E000
heap
page read and write
4B50000
direct allocation
page read and write
5224000
heap
page read and write
318D000
heap
page read and write
31D4000
heap
page read and write
31A9000
heap
page read and write
3188000
heap
page read and write
5B98000
heap
page read and write
3155000
heap
page read and write
5228000
heap
page read and write
3188000
heap
page read and write
31E9000
heap
page read and write
5400000
direct allocation
page read and write
5213000
heap
page read and write
32A0000
heap
page read and write
3178000
heap
page read and write
31EB000
heap
page read and write
521D000
heap
page read and write
5E26000
heap
page read and write
51FD000
heap
page read and write
316B000
heap
page read and write
3188000
heap
page read and write
3188000
heap
page read and write
51E7000
heap
page read and write
3180000
heap
page read and write
31E6000
heap
page read and write
520E000
heap
page read and write
3569000
heap
page read and write
5D01000
heap
page read and write
31D5000
heap
page read and write
5220000
heap
page read and write
51FD000
heap
page read and write
31FA000
heap
page read and write
3197000
heap
page read and write
3188000
heap
page read and write
31FA000
heap
page read and write
3189000
heap
page read and write
318E000
heap
page read and write
5DE1000
heap
page read and write
3180000
heap
page read and write
5228000
heap
page read and write
31F2000
heap
page read and write
2FFE000
stack
page read and write
3171000
heap
page read and write
165A1E20000
heap
page read and write
31F2000
heap
page read and write
31AD000
heap
page read and write
5AB0000
heap
page read and write
5224000
heap
page read and write
31F6000
heap
page read and write
31FE000
heap
page read and write
4B50000
direct allocation
page read and write
53F0000
direct allocation
page read and write
31A9000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
316B000
heap
page read and write
318C000
heap
page read and write
32F0000
heap
page read and write
51EE000
heap
page read and write
31A8000
heap
page read and write
51FE000
heap
page read and write
31FE000
heap
page read and write
5B26000
heap
page read and write
319D000
heap
page read and write
5220000
heap
page read and write
319B000
heap
page read and write
31FE000
heap
page read and write
4B50000
direct allocation
page read and write
3180000
heap
page read and write
52E0000
direct allocation
page read and write
31A6000
heap
page read and write
318A000
heap
page read and write
3189000
heap
page read and write
315E000
heap
page read and write
319A000
heap
page read and write
316E000
heap
page read and write
5AF2000
heap
page read and write
3188000
heap
page read and write
314C000
heap
page read and write
4B50000
direct allocation
page read and write
319A000
heap
page read and write
3172000
heap
page read and write
5A7C000
heap
page read and write
51FE000
heap
page read and write
31F2000
heap
page read and write
6CD000
unkown
page readonly
451000
unkown
page execute read
5A97000
heap
page read and write
315B000
heap
page read and write
317E000
heap
page read and write
4B50000
direct allocation
page read and write
318D000
heap
page read and write
31F6000
heap
page read and write
315E000
heap
page read and write
31A9000
heap
page read and write
52E0000
direct allocation
page read and write
3180000
heap
page read and write
3180000
heap
page read and write
3154000
heap
page read and write
2793000
heap
page read and write
31DA000
heap
page read and write
5B88000
heap
page read and write
613E000
stack
page read and write
521E000
heap
page read and write
5E048FC000
stack
page read and write
31A9000
heap
page read and write
52F0000
direct allocation
page read and write
5207000
heap
page read and write
31E9000
heap
page read and write
51FD000
heap
page read and write
5C82000
heap
page read and write
4B40000
direct allocation
page read and write
31A2000
heap
page read and write
5228000
heap
page read and write
3180000
heap
page read and write
5B39000
heap
page read and write
51FE000
heap
page read and write
319D000
heap
page read and write
31DA000
heap
page read and write
31D7000
heap
page read and write
3173000
heap
page read and write
318D000
heap
page read and write
31F2000
heap
page read and write
5E046FD000
stack
page read and write
31E6000
heap
page read and write
319B000
heap
page read and write
31FE000
heap
page read and write
3181000
heap
page read and write
3588000
heap
page read and write
31FA000
heap
page read and write
31A9000
heap
page read and write
34B8000
heap
page read and write
5220000
heap
page read and write
31E6000
heap
page read and write
31A9000
heap
page read and write
51E0000
direct allocation
page read and write
5B3A000
heap
page read and write
318F000
heap
page read and write
3524000
heap
page read and write
52E0000
direct allocation
page read and write
31D9000
heap
page read and write
31F3000
heap
page read and write
319A000
heap
page read and write
31E9000
heap
page read and write
5217000
heap
page read and write
318F000
heap
page read and write
5D34000
heap
page read and write
31FD000
heap
page read and write
5207000
heap
page read and write
307E000
stack
page read and write
358B000
heap
page read and write
319E000
heap
page read and write
31F2000
heap
page read and write
5228000
heap
page read and write
31F6000
heap
page read and write
31F3000
heap
page read and write
52E0000
direct allocation
page read and write
31F2000
heap
page read and write
5217000
heap
page read and write
523E000
heap
page read and write
5E9C000
heap
page read and write
31FA000
heap
page read and write
316E000
heap
page read and write
31F2000
heap
page read and write
51FE000
heap
page read and write
31A9000
heap
page read and write
4B50000
direct allocation
page read and write
5221000
heap
page read and write
31A2000
heap
page read and write
31D0000
heap
page read and write
3175000
heap
page read and write
3152000
heap
page read and write
31DA000
heap
page read and write
31F3000
heap
page read and write
5AF4000
heap
page read and write
5200000
heap
page read and write
53B6000
heap
page read and write
3175000
heap
page read and write
31E8000
heap
page read and write
3185000
heap
page read and write
31AA000
heap
page read and write
319E000
heap
page read and write
5223000
heap
page read and write
3182000
heap
page read and write
3154000
heap
page read and write
3152000
heap
page read and write
3173000
heap
page read and write
319C000
heap
page read and write
3180000
heap
page read and write
6027000
heap
page read and write
53F0000
direct allocation
page read and write
523E000
heap
page read and write
52E0000
direct allocation
page read and write
31FB000
heap
page read and write
316B000
heap
page read and write
31EA000
heap
page read and write
520A000
heap
page read and write
3149000
heap
page read and write
3189000
heap
page read and write
51F1000
heap
page read and write
3178000
heap
page read and write
5217000
heap
page read and write
3525000
heap
page read and write
31A9000
heap
page read and write
4B50000
direct allocation
page read and write
3155000
heap
page read and write
319D000
heap
page read and write
31F2000
heap
page read and write
31FC000
stack
page read and write
53D0000
heap
page read and write
318A000
heap
page read and write
4B50000
direct allocation
page read and write
31E0000
heap
page read and write
31A9000
heap
page read and write
5212000
heap
page read and write
31F2000
heap
page read and write
3182000
heap
page read and write
5201000
heap
page read and write
5229000
heap
page read and write
51E1000
heap
page read and write
3184000
heap
page read and write
5205000
heap
page read and write
5216000
heap
page read and write
165A4720000
heap
page read and write
4B40000
direct allocation
page read and write
31D9000
heap
page read and write
318A000
heap
page read and write
2ADFB890000
heap
page read and write
5209000
heap
page read and write
317D000
heap
page read and write
52E0000
direct allocation
page read and write
31A9000
heap
page read and write
3171000
heap
page read and write
317C000
heap
page read and write
3147000
heap
page read and write
31A7000
heap
page read and write
31FE000
heap
page read and write
5219000
heap
page read and write
2900000
heap
page read and write
31D4000
heap
page read and write
2DEE000
stack
page read and write
5A68000
heap
page read and write
31A1000
heap
page read and write
3178000
heap
page read and write
31AA000
heap
page read and write
3155000
heap
page read and write
4B50000
direct allocation
page read and write
354D000
heap
page read and write
51E1000
heap
page read and write
31E0000
heap
page read and write
318C000
heap
page read and write
31FA000
heap
page read and write
3156000
heap
page read and write
5AB2000
heap
page read and write
31E9000
heap
page read and write
3143000
heap
page read and write
51E3000
heap
page read and write
31F8000
heap
page read and write
31F2000
heap
page read and write
31D1000
heap
page read and write
3178000
heap
page read and write
4B50000
direct allocation
page read and write
5E0487D000
stack
page read and write
5C4A000
heap
page read and write
31A9000
heap
page read and write
31F2000
heap
page read and write
4B50000
direct allocation
page read and write
353F000
heap
page read and write
31F6000
heap
page read and write
31A9000
heap
page read and write
3163000
heap
page read and write
31EA000
heap
page read and write
5202000
heap
page read and write
3550000
heap
page read and write
3180000
heap
page read and write
317E000
heap
page read and write
5D70000
heap
page read and write
522C000
heap
page read and write
3153000
heap
page read and write
52E0000
direct allocation
page read and write
31D5000
heap
page read and write
5DFA000
heap
page read and write
31F3000
heap
page read and write
5219000
heap
page read and write
522B000
heap
page read and write
318C000
heap
page read and write
3176000
heap
page read and write
3197000
heap
page read and write
62EC000
stack
page read and write
53AB000
heap
page read and write
31A1000
heap
page read and write
31D8000
heap
page read and write
31A1000
heap
page read and write
51F5000
heap
page read and write
31FE000
heap
page read and write
3178000
heap
page read and write
316D000
heap
page read and write
31E3000
heap
page read and write
3190000
heap
page read and write
3171000
heap
page read and write
4B50000
direct allocation
page read and write
51FE000
heap
page read and write
4B50000
direct allocation
page read and write
3513000
heap
page read and write
31F2000
heap
page read and write
31A1000
heap
page read and write
3175000
heap
page read and write
31FE000
heap
page read and write
31E8000
heap
page read and write
51FE000
heap
page read and write
521E000
heap
page read and write
31E9000
heap
page read and write
4B50000
direct allocation
page read and write
31FE000
heap
page read and write
31E0000
heap
page read and write
30A0000
heap
page read and write
5217000
heap
page read and write
3188000
heap
page read and write
285B000
stack
page read and write
31F3000
heap
page read and write
3168000
heap
page read and write
5B90000
heap
page read and write
31DE000
heap
page read and write
319F000
heap
page read and write
31F3000
heap
page read and write
31A9000
heap
page read and write
31A0000
heap
page read and write
3153000
heap
page read and write
4B50000
direct allocation
page read and write
31A2000
heap
page read and write
318E000
heap
page read and write
5ADC000
heap
page read and write
3190000
heap
page read and write
31F2000
heap
page read and write
31E3000
heap
page read and write
53F0000
direct allocation
page read and write
315E000
heap
page read and write
5D7C000
heap
page read and write
3178000
heap
page read and write
31A2000
heap
page read and write
31F3000
heap
page read and write
31F3000
heap
page read and write
B3E000
heap
page read and write
3147000
heap
page read and write
31D5000
heap
page read and write
31A1000
heap
page read and write
3150000
heap
page read and write
53BA000
heap
page read and write
31F2000
heap
page read and write
5D36000
heap
page read and write
31AC000
heap
page read and write
31A9000
heap
page read and write
31F9000
heap
page read and write
3172000
heap
page read and write
31A1000
heap
page read and write
3178000
heap
page read and write
31DE000
heap
page read and write
F5A0B7E000
stack
page read and write
4B50000
direct allocation
page read and write
31F3000
heap
page read and write
314C000
heap
page read and write
5AF5000
heap
page read and write
318A000
heap
page read and write
165A36E0000
heap
page read and write
5B80000
heap
page read and write
31E6000
heap
page read and write
31F8000
heap
page read and write
31F2000
heap
page read and write
5B5D000
heap
page read and write
5231000
heap
page read and write
522B000
heap
page read and write
31A9000
heap
page read and write
3173000
heap
page read and write
3503000
heap
page read and write
51EE000
heap
page read and write
5DCE000
heap
page read and write
31AA000
heap
page read and write
31A9000
heap
page read and write
3175000
heap
page read and write
5E043BF000
stack
page read and write
314C000
heap
page read and write
319D000
heap
page read and write
31FA000
heap
page read and write
4B50000
direct allocation
page read and write
5D12000
heap
page read and write
3155000
heap
page read and write
5A79000
heap
page read and write
31DE000
heap
page read and write
31D0000
heap
page read and write
31E3000
heap
page read and write
521E000
heap
page read and write
314C000
heap
page read and write
There are 3057 hidden memdumps, click here to show them.