IOC Report
AztyGMg4jw.dll

loading gif

Files

File Path
Type
Category
Malicious
AztyGMg4jw.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\$WinREAgent\Scratch\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\$WinREAgent\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\PerfLogs\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Windows Photo Viewer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\7-Zip\7-zip.dll
data
dropped
malicious
C:\Program Files\7-Zip\7-zip32.dll
data
dropped
malicious
C:\Program Files\7-Zip\7z.dll
data
dropped
malicious
C:\Program Files\7-Zip\7z.exe
data
dropped
malicious
C:\Program Files\7-Zip\7zFM.exe
data
dropped
malicious
C:\Program Files\7-Zip\7zG.exe
OpenPGP Secret Key
dropped
malicious
C:\Program Files\7-Zip\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Common Files\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Google\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Internet Explorer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\MSBuild\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Microsoft Office 15\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\crashreporter.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\default-browser-agent.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
OpenPGP Public Key
dropped
malicious
C:\Program Files\Mozilla Firefox\freebl3.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\gkcodecs.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Mozilla Firefox\ipcclientcerts.dll
OpenPGP Public Key
dropped
malicious
C:\Program Files\Mozilla Firefox\lgpllibs.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\libEGL.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\libGLESv2.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\maintenanceservice.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\minidump-analyzer.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\mozavcodec.dll
COM executable for DOS
dropped
malicious
C:\Program Files\Mozilla Firefox\mozavutil.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\mozglue.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\mozwer.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\msvcp140.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\notificationserver.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\nss3.dll
MPEG-4 LOAS
dropped
malicious
C:\Program Files\Mozilla Firefox\nssckbi.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\osclientcerts.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\plugin-container.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\private_browsing.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\qipcap64.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\softokn3.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\updater.exe
data
dropped
malicious
C:\Program Files\Mozilla Firefox\vcruntime140.dll
data
dropped
malicious
C:\Program Files\Mozilla Firefox\vcruntime140_1.dll
data
modified
malicious
C:\Program Files\Reference Assemblies\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Uninstall Information\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Defender\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\AutoIt3\Au3Check.dat
data
dropped
C:\Program Files (x86)\AutoIt3\Au3Check.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Au3Info.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Au3Info_x64.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe
data
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Aut2Exe\upx.exe
data
dropped
C:\Program Files (x86)\AutoIt3\AutoIt v3 Website.url
data
dropped
C:\Program Files (x86)\AutoIt3\AutoIt.chm
DOS executable (COM, 0x8C-variant)
dropped
C:\Program Files (x86)\AutoIt3\AutoIt3Help.exe
data
dropped
C:\Program Files (x86)\AutoIt3\AutoIt3_x64.exe
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX.chm
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX.psd1
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.Assembly.dll
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.Assembly.xml
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.dll
OpenPGP Public Key
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_DLL.h
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_DLL.lib
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_x64.dll
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3_x64_DLL.lib
data
dropped
C:\Program Files (x86)\AutoIt3\AutoItX\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Examples\_ReadMe_.txt
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\calculator.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\count-do.au3
Amiga Workbench
dropped
C:\Program Files (x86)\AutoIt3\Examples\count-for.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\count-while.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\functions.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\inputbox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Examples\msgbox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\notepad1.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Examples\notepad2.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Extras\_ReadMe_.txt
data
dropped
C:\Program Files (x86)\AutoIt3\Extras\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Blue.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Green.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Red.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\MyAutoIt3_Yellow.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3script_v10.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3script_v11.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\au3script_v9.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\filetype-blank.ico
data
dropped
C:\Program Files (x86)\AutoIt3\Icons\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Include\APIComConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIDiagConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIDlgConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIErrorsConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIFilesConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIGdiConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APILocaleConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIMiscConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIProcConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIRegConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIResConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIShPathConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIShellExConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APISysConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\APIThemeConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\AVIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Array.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ArrayDisplayInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\AutoItConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\AutoItExitCodes.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\AutoItFatalExitConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\BorderConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ButtonConstants.au3
OpenPGP Public Key
dropped
C:\Program Files (x86)\AutoIt3\Include\CUIAutomation2.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Clipboard.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Color.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ColorConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ComboConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Constants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Crypt.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Date.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\DateTimeConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Debug.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\DirConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\EditConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\EventLog.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Excel.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ExcelConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\FTPEx.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\File.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\FileConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\FontConstants.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\FrameConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GDIPlus.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GDIPlusConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GUIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GUIConstantsEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiAVI.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiButton.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiComboBox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiComboBoxEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiCtrlInternals.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiDateTimePicker.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiEdit.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiHeader.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiIPAddress.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiImageList.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiListBox.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiListView.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiMenu.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiMonthCal.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiReBar.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiRichEdit.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiScrollBars.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiSlider.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiStatusBar.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiTab.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiToolTip.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiToolbar.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\GuiTreeView.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\HeaderConstants.au3
PGP Secret Sub-key -
dropped
C:\Program Files (x86)\AutoIt3\Include\IE.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\IPAddressConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ImageListConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Inet.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\InetConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ListBoxConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ListViewConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Math.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MathConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Memory.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MemoryConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MenuConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Misc.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\MsgBoxConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\NTSTATUSConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\NamedPipes.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\NetShare.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\PowerPoint.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\PowerPointConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Process.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ProcessConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ProgressConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\RebarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\RichEditConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SQLite.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SQLite.dll.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ScreenCapture.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ScrollBarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ScrollBarsConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Security.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SecurityConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SendMessage.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\SliderConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Sound.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StaticConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StatusBarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\String.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StringConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\StructureConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\TabConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Timers.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ToolTipConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\ToolbarConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\TrayConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\TreeViewConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\UDFGlobalID.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\UIAWrappers.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\UpDownConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\Visa.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPI.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPICom.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIConv.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIDiag.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIDlg.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIError.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIFiles.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIGdi.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIGdiDC.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIGdiInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIHObj.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIIcons.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPILocale.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIMem.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIMisc.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIProc.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIReg.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIRes.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIShPath.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIShellEx.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPISys.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPISysInternals.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPISysWin.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPITheme.au3
OpenPGP Secret Key
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIlangConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIsysinfoConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinAPIvkeysConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WinNet.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WindowsConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\WordConstants.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\_ReadMe_.txt
data
dropped
C:\Program Files (x86)\AutoIt3\Include\analysistimer.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\cleanup.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\corporate.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\helper.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\htmlfetcher.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\htmlfetcherchrome.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Include\keylogger.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\liveprocess.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\stats.au3
data
dropped
C:\Program Files (x86)\AutoIt3\Include\word.au3
data
dropped
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
data
dropped
C:\Program Files (x86)\AutoIt3\SciTE\au3.keywords.properties
data
dropped
C:\Program Files (x86)\AutoIt3\SciTE\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AutoIt3\Uninstall.exe
data
dropped
C:\Program Files (x86)\AutoIt3\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\DESIGNER\MSADDNDR.OLB
data
dropped
C:\Program Files (x86)\Common Files\DESIGNER\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Java\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Microsoft Shared\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Oracle\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\Services\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\System\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Common Files\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Google\Update\GoogleUpdate.bk
data
dropped
C:\Program Files (x86)\Google\Update\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Google\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\SIGNUP\install.ins
data
dropped
C:\Program Files (x86)\Internet Explorer\SIGNUP\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\images\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Internet Explorer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Java\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Java\jre-1.8\COPYRIGHT
data
dropped
C:\Program Files (x86)\Java\jre-1.8\LICENSE
data
dropped
C:\Program Files (x86)\Java\jre-1.8\README.txt
data
dropped
C:\Program Files (x86)\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt
data
dropped
C:\Program Files (x86)\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt
data
dropped
C:\Program Files (x86)\Java\jre-1.8\Welcome.html
data
dropped
C:\Program Files (x86)\Java\jre-1.8\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Java\jre-1.8\release
data
dropped
C:\Program Files (x86)\MSBuild\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\MSBuild\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\kms_host.vbs
data
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\kms_host.xml
data
dropped
C:\Program Files (x86)\MSECache\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\AppXManifest.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\FileSystemMetadata.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\OSPP.HTM
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\OSPPREARM.EXE
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\SLERROR.XML
data
dropped
C:\Program Files (x86)\Microsoft Office\Office16\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\Office16\vNextDiag.ps1
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0015-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0015-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0000-0000-0000000FF1CE.xml
DOS executable (COM)
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0409-0000-0000000FF1CE.xml
DOS executable (COM)
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0019-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0019-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001A-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001A-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0000-0000-0000000FF1CE.xml
OpenPGP Public Key
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0C0A-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-002A-0000-1000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-002A-0409-1000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-006E-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0409-0000-0000000FF1CE.xml
DOS executable (COM)
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-012A-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-012B-0409-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.90160000-3102-0000-0000-0000000FF1CE.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifest.common.16.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AppXManifestLoc.16.en-us.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\AuthoredExtensions.16.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\PackageManifests\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\ThinAppXManifest.xml
data
dropped
C:\Program Files (x86)\Microsoft Office\Updates\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\root\c2rx.sccd
data
dropped
C:\Program Files (x86)\Microsoft Office\root\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\Csi.dll
data
dropped
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\Mso20win32client.dll
data
dropped
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\Microsoft.mshtml.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\Microsoft.stdformat.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\adodb.dll
OpenPGP Secret Key
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\msdatasrc.dll
OpenPGP Secret Key
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\stdole.dll
data
dropped
C:\Program Files (x86)\Microsoft.NET\RedistList\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\EdgeCore\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\EdgeWebView\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\Edge\Edge.dat
data
dropped
C:\Program Files (x86)\Microsoft\Edge\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\Temp\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe
data
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\logs\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log
data
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
OpenPGP Secret Key
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\updater.ini
data
dropped
C:\Program Files (x86)\QnPkEpoXWIeSCixQdcAXTHyBTwixNTfoEpzzkDkDyeVPmOZqRiPlKzGjdIBtwVSDFvxOrWrRxkD\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Reference Assemblies\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Reference Assemblies\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Defender\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Defender\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Mail\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\Media Renderer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\Network Sharing\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\Skins\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\Visualizations\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Multimedia Platform\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows NT\Accessories\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows NT\TableTextService\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows NT\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Photo Viewer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Portable Devices\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\Modules\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\jDownloader\config\database.script
data
dropped
C:\Program Files (x86)\jDownloader\config\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\jDownloader\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\7-Zip\7-zip.chm
data
dropped
C:\Program Files\7-Zip\7z.sfx
data
dropped
C:\Program Files\7-Zip\7zCon.sfx
data
dropped
C:\Program Files\7-Zip\History.txt
data
dropped
C:\Program Files\7-Zip\Lang\af.txt
data
dropped
C:\Program Files\7-Zip\Lang\an.txt
COM executable for DOS
dropped
C:\Program Files\7-Zip\Lang\ar.txt
data
dropped
C:\Program Files\7-Zip\Lang\ast.txt
data
dropped
C:\Program Files\7-Zip\Lang\az.txt
data
dropped
C:\Program Files\7-Zip\Lang\ba.txt
data
dropped
C:\Program Files\7-Zip\Lang\be.txt
data
dropped
C:\Program Files\7-Zip\Lang\bg.txt
data
dropped
C:\Program Files\7-Zip\Lang\bn.txt
data
dropped
C:\Program Files\7-Zip\Lang\br.txt
data
dropped
C:\Program Files\7-Zip\Lang\ca.txt
data
dropped
C:\Program Files\7-Zip\Lang\co.txt
data
dropped
C:\Program Files\7-Zip\Lang\cs.txt
RDI Acoustic Doppler Current Profiler (ADCP)
dropped
C:\Program Files\7-Zip\Lang\cy.txt
data
dropped
C:\Program Files\7-Zip\Lang\da.txt
data
dropped
C:\Program Files\7-Zip\Lang\de.txt
data
dropped
C:\Program Files\7-Zip\Lang\el.txt
data
dropped
C:\Program Files\7-Zip\Lang\en.ttt
DOS executable (COM, 0x8C-variant)
dropped
C:\Program Files\7-Zip\Lang\eo.txt
data
dropped
C:\Program Files\7-Zip\Lang\es.txt
data
dropped
C:\Program Files\7-Zip\Lang\et.txt
OpenPGP Secret Key
dropped
C:\Program Files\7-Zip\Lang\eu.txt
data
dropped
C:\Program Files\7-Zip\Lang\ext.txt
data
dropped
C:\Program Files\7-Zip\Lang\fa.txt
data
dropped
C:\Program Files\7-Zip\Lang\fi.txt
data
dropped
C:\Program Files\7-Zip\Lang\fr.txt
data
dropped
C:\Program Files\7-Zip\Lang\fur.txt
data
dropped
C:\Program Files\7-Zip\Lang\fy.txt
data
dropped
C:\Program Files\7-Zip\Lang\ga.txt
data
dropped
C:\Program Files\7-Zip\Lang\gl.txt
data
dropped
C:\Program Files\7-Zip\Lang\gu.txt
data
dropped
C:\Program Files\7-Zip\Lang\he.txt
data
dropped
C:\Program Files\7-Zip\Lang\hi.txt
data
dropped
C:\Program Files\7-Zip\Lang\hr.txt
data
dropped
C:\Program Files\7-Zip\Lang\hu.txt
data
dropped
C:\Program Files\7-Zip\Lang\hy.txt
data
dropped
C:\Program Files\7-Zip\Lang\id.txt
data
dropped
C:\Program Files\7-Zip\Lang\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\7-Zip\Lang\io.txt
data
dropped
C:\Program Files\7-Zip\Lang\is.txt
data
dropped
C:\Program Files\7-Zip\Lang\it.txt
data
dropped
C:\Program Files\7-Zip\Lang\ja.txt
data
dropped
C:\Program Files\7-Zip\Lang\ka.txt
data
dropped
C:\Program Files\7-Zip\Lang\kaa.txt
data
dropped
C:\Program Files\7-Zip\Lang\kab.txt
data
dropped
C:\Program Files\7-Zip\Lang\kk.txt
data
dropped
C:\Program Files\7-Zip\Lang\ko.txt
data
dropped
C:\Program Files\7-Zip\Lang\ku-ckb.txt
data
dropped
C:\Program Files\7-Zip\Lang\ku.txt
data
dropped
C:\Program Files\7-Zip\Lang\ky.txt
OpenPGP Secret Key
dropped
C:\Program Files\7-Zip\Lang\lij.txt
data
dropped
C:\Program Files\7-Zip\Lang\lt.txt
data
dropped
C:\Program Files\7-Zip\Lang\lv.txt
data
dropped
C:\Program Files\7-Zip\Lang\mk.txt
data
dropped
C:\Program Files\7-Zip\Lang\mn.txt
data
dropped
C:\Program Files\7-Zip\Lang\mng.txt
data
dropped
C:\Program Files\7-Zip\Lang\mng2.txt
OpenPGP Secret Key
dropped
C:\Program Files\7-Zip\Lang\mr.txt
data
dropped
C:\Program Files\7-Zip\Lang\ms.txt
data
dropped
C:\Program Files\7-Zip\Lang\nb.txt
data
dropped
C:\Program Files\7-Zip\Lang\ne.txt
data
dropped
C:\Program Files\7-Zip\Lang\nl.txt
data
dropped
C:\Program Files\7-Zip\Lang\nn.txt
data
dropped
C:\Program Files\7-Zip\Lang\pa-in.txt
data
dropped
C:\Program Files\7-Zip\Lang\pl.txt
data
dropped
C:\Program Files\7-Zip\Lang\ps.txt
data
dropped
C:\Program Files\7-Zip\Lang\pt-br.txt
data
dropped
C:\Program Files\7-Zip\Lang\pt.txt
COM executable for DOS
dropped
C:\Program Files\7-Zip\Lang\ro.txt
data
dropped
C:\Program Files\7-Zip\Lang\ru.txt
data
dropped
C:\Program Files\7-Zip\Lang\sa.txt
data
dropped
C:\Program Files\7-Zip\Lang\si.txt
OpenPGP Public Key
dropped
C:\Program Files\7-Zip\Lang\sk.txt
data
dropped
C:\Program Files\7-Zip\Lang\sl.txt
data
dropped
C:\Program Files\7-Zip\Lang\sq.txt
data
dropped
C:\Program Files\7-Zip\Lang\sr-spc.txt
data
dropped
C:\Program Files\7-Zip\Lang\sr-spl.txt
data
dropped
C:\Program Files\7-Zip\Lang\sv.txt
data
dropped
C:\Program Files\7-Zip\Lang\sw.txt
data
dropped
C:\Program Files\7-Zip\Lang\ta.txt
data
dropped
C:\Program Files\7-Zip\Lang\tg.txt
data
dropped
C:\Program Files\7-Zip\Lang\th.txt
data
dropped
C:\Program Files\7-Zip\Lang\tk.txt
data
dropped
C:\Program Files\7-Zip\Lang\tr.txt
data
dropped
C:\Program Files\7-Zip\Lang\tt.txt
data
dropped
C:\Program Files\7-Zip\Lang\ug.txt
data
dropped
C:\Program Files\7-Zip\Lang\uk.txt
OpenPGP Secret Key
dropped
C:\Program Files\7-Zip\Lang\uz-cyrl.txt
data
dropped
C:\Program Files\7-Zip\Lang\uz.txt
data
dropped
C:\Program Files\7-Zip\Lang\va.txt
data
dropped
C:\Program Files\7-Zip\Lang\vi.txt
data
dropped
C:\Program Files\7-Zip\Lang\yo.txt
data
dropped
C:\Program Files\7-Zip\Lang\zh-cn.txt
data
dropped
C:\Program Files\7-Zip\Lang\zh-tw.txt
data
dropped
C:\Program Files\7-Zip\License.txt
data
dropped
C:\Program Files\7-Zip\Uninstall.exe
data
dropped
C:\Program Files\7-Zip\descript.ion
data
dropped
C:\Program Files\7-Zip\readme.txt
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf
OpenPGP Secret Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ACE.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ADNotificationManager.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ADelRCP.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AGM.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AGMGPUOptIn.ini
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AIDE.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ANCUtility.dll
OpenPGP Public Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AXE8SharedExpat.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AXSLE.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroBroker.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroDunamis.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroTextExtractor.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Adobe.Acrobat.Dependencies.manifest
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeLinguistic.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeXMP.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\BIB.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\BIBUtils.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CRClient.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CRLogTransport.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CRWindowsClientService.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Click on 'Change' to select default PDF handler.pdf
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\CoolType.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\DirectInk.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\Eula.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ExtendScript.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\JP2KLib.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\LogTransport2.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\PDFPrevHndlr.dll
OpenPGP Secret Key
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\PDFSigQFormalRep.pdf
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\RTC.der
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ReaderUC.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ScCore.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ShowAppPickerForPDF.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ViewerPS.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat.tlb
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\adobeafp.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ahclient.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_asym.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_base.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_base_non_fips.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\ccme_ecc.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\cr_win_client_config.cfg
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\cryptocme.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\cryptocme.sig
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icucnv58.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icucnv67.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icucnv69.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icudt58.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icudt67.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icudt69.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icuuc58.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icuuc67.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\icuuc69.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\logsession.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\pe.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\pmd.cer
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\rt3d.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\sqlite.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Esl\Aiod.dll
data
dropped
C:\Program Files\Adobe\Acrobat DC\Esl\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\Resource\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Adobe\Acrobat\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Adobe\HelpCfg\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\Services\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\Ole DB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\ado\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\msadc\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvSubsystems64_msix.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVScripting.dll
OpenPGP Secret Key
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32_msix.dll
PGP Secret Sub-key -
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64_arm64x.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.bg-bg.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.cs-cz.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.el-gr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-gb.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.es-es.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.es-mx.dll
COM executable for DOS
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.et-ee.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fi-fi.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-ca.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.he-il.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hi-in.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hr-hr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hu-hu.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.id-id.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.it-it.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.kk-kz.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ko-kr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lt-lt.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lv-lv.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nl-nl.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-br.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ro-ro.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sk-sk.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sl-si.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sr-latn-rs.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sv-se.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.tr-tr.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.uk-ua.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-tw.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RUI.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RCom.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeOEMPlugin.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xml
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\SharedPerformance.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\StreamServer.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\SubsystemController.man
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-localization-l1-2-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-synch-l1-2-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-timezone-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-xstate-l2-1-0.dll
DOS executable (COM)
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-conio-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-convert-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-filesystem-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-private-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-process-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-runtime-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-string-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\c2r32werhandler.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\c2r64werhandler.dll
OpenPGP Public Key
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\inventory.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\manageability.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\officeinventory.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgr.exe
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgrschedule.xml
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\offreg.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\policy.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\ucrtbase.dll
data
dropped
C:\Program Files\Common Files\microsoft shared\ClickToRun\vccorlib140.dll
COM executable for DOS
dropped
C:\Program Files\Common Files\microsoft shared\MSInfo\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\Stationery\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\TextConv\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\Triedit\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VGX\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\ink\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Google\Chrome\Application\chrome.VisualElementsManifest.xml
data
dropped
C:\Program Files\Google\Chrome\Application\chrome.exe
data
dropped
C:\Program Files\Google\Chrome\Application\chrome_proxy.exe
data
dropped
C:\Program Files\Google\Chrome\Application\initial_preferences
data
dropped
C:\Program Files\Google\Chrome\Application\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Google\Chrome\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\SIGNUP\install.ins
data
dropped
C:\Program Files\Internet Explorer\SIGNUP\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Internet Explorer\images\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\MSBuild\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe
data
dropped
C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe
data
dropped
C:\Program Files\Microsoft Office 15\ClientX64\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Microsoft\OneDrive\ListSync\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Microsoft\OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\application.ini
data
dropped
C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_150.png
data
dropped
C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png
data
dropped
C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png
data
dropped
C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png
data
dropped
C:\Program Files\Mozilla Firefox\browser\VisualElements\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\browser\crashreporter-override.ini
data
dropped
C:\Program Files\Mozilla Firefox\browser\features\formautofill@mozilla.org.xpi
data
dropped
C:\Program Files\Mozilla Firefox\browser\features\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\browser\features\pictureinpicture@mozilla.org.xpi
data
dropped
C:\Program Files\Mozilla Firefox\browser\features\screenshots@mozilla.org.xpi
data
dropped
C:\Program Files\Mozilla Firefox\browser\features\webcompat-reporter@mozilla.org.xpi
data
dropped
C:\Program Files\Mozilla Firefox\browser\features\webcompat@mozilla.org.xpi
data
dropped
C:\Program Files\Mozilla Firefox\browser\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\browser\omni.ja
data
dropped
C:\Program Files\Mozilla Firefox\crashreporter.ini
DOS executable (COM, 0x8C-variant)
dropped
C:\Program Files\Mozilla Firefox\defaultagent.ini
data
dropped
C:\Program Files\Mozilla Firefox\defaultagent_localized.ini
data
dropped
C:\Program Files\Mozilla Firefox\defaults\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\defaults\pref\channel-prefs.js
data
dropped
C:\Program Files\Mozilla Firefox\defaults\pref\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\dependentlibs.list
data
dropped
C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml
data
dropped
C:\Program Files\Mozilla Firefox\firefox.exe.sig
data
dropped
C:\Program Files\Mozilla Firefox\fonts\TwemojiMozilla.ttf
data
dropped
C:\Program Files\Mozilla Firefox\fonts\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\clearkey.dll
data
dropped
C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\clearkey.dll.sig
data
dropped
C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\manifest.json
OpenPGP Secret Key
dropped
C:\Program Files\Mozilla Firefox\gmp-clearkey\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\install.log
data
dropped
C:\Program Files\Mozilla Firefox\installation_telemetry.json
data
dropped
C:\Program Files\Mozilla Firefox\locale.ini
data
dropped
C:\Program Files\Mozilla Firefox\omni.ja
data
dropped
C:\Program Files\Mozilla Firefox\pingsender.exe
data
dropped
C:\Program Files\Mozilla Firefox\platform.ini
data
dropped
C:\Program Files\Mozilla Firefox\plugin-container.exe.sig
data
dropped
C:\Program Files\Mozilla Firefox\postSigningData
data
dropped
C:\Program Files\Mozilla Firefox\precomplete
data
dropped
C:\Program Files\Mozilla Firefox\private_browsing.VisualElementsManifest.xml
data
dropped
C:\Program Files\Mozilla Firefox\removed-files
data
dropped
C:\Program Files\Mozilla Firefox\uninstall\helper.exe
data
dropped
C:\Program Files\Mozilla Firefox\uninstall\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini
data
dropped
C:\Program Files\Mozilla Firefox\uninstall\uninstall.log
data
dropped
C:\Program Files\Mozilla Firefox\update-settings.ini
data
dropped
C:\Program Files\Mozilla Firefox\updater.ini
data
dropped
C:\Program Files\Mozilla Firefox\xul.dll
data
dropped
C:\Program Files\Mozilla Firefox\xul.dll.sig
data
dropped
C:\Program Files\Mozilla Firefox\zoneIdProvenanceData
data
dropped
C:\Program Files\Reference Assemblies\Microsoft\Framework\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Reference Assemblies\Microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender Advanced Threat Protection\Classification\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender Advanced Threat Protection\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\Offline\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\Platform\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Mail\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Media Renderer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Network Sharing\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Skins\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\Visualizations\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Media Player\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Multimedia Platform\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\Accessories\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\Accessories\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\Accessories\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\TableTextService\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\TableTextService\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Photo Viewer\en-GB\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Photo Viewer\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Portable Devices\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Security\BrowserCore\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Security\BrowserCore\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Security\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\WindowsPowerShell\Modules\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\WindowsPowerShell\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\.curlrc
data
dropped
C:\ProgramData\Adobe\ARM\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Adobe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft OneDrive\setup\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft OneDrive\setup\refcount.ini
data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\UpdateLock-308046B0AF4A39CB
data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6c4d48a3-a9bb-4a17-a28d-f11a368ae958.json
data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
data
dropped
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{D5D19E2F-7189-42FE-8103-92CD1FA457C2}v14.36.32532\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.549981C3F5F10_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.Getstarted_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.Microsoft3DViewer_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.MixedReality.Portal_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.Office.OneNote_8wekyb3d8bbwe\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Packages\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\SoftwareDistribution\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\USOShared\Logs\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\USOShared\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\WindowsHolographicDevices\SpatialStore\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\WindowsHolographicDevices\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\_curlrc
data
dropped
C:\ProgramData\dbg\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\regid.1991-06.com.microsoft\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
data
dropped
C:\ProgramData\ssh\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\AppData\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Desktop\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Documents\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Downloads\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Favorites\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Links\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Music\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\NTUSER.DAT
data
dropped
C:\Users\Default\OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Pictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Saved Games\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Videos\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\AccountPictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\Adobe Acrobat.lnk
data
dropped
C:\Users\Public\Desktop\Firefox.lnk
data
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
data
dropped
C:\Users\Public\Desktop\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Documents\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Downloads\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\RecordedTV.library-ms
data
dropped
C:\Users\Public\Libraries\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Pictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Videos\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\.curlrc
data
dropped
C:\Users\user\.ms-ad\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\3D Objects\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\fkdjsadasd.ico
MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
dropped
C:\Users\user\AppData\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Contacts\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\BJZFPPWAPT.jpg
data
dropped
C:\Users\user\Desktop\BNAGMGSPLO.docx
data
dropped
C:\Users\user\Desktop\BNAGMGSPLO.xlsx
data
dropped
C:\Users\user\Desktop\DUUDTUBZFW.png
data
dropped
C:\Users\user\Desktop\EEGWXUHVUG.jpg
data
dropped
C:\Users\user\Desktop\EEGWXUHVUG.xlsx
OpenPGP Secret Key
dropped
C:\Users\user\Desktop\EFOYFBOLXA.mp3
data
dropped
C:\Users\user\Desktop\EFOYFBOLXA.pdf
data
dropped
C:\Users\user\Desktop\EFOYFBOLXA.xlsx
data
dropped
C:\Users\user\Desktop\Excel.lnk
data
dropped
C:\Users\user\Desktop\GIGIYTFFYT.png
data
dropped
C:\Users\user\Desktop\JDDHMPCDUJ.mp3
data
dropped
C:\Users\user\Desktop\NVWZAPQSQL.png
data
dropped
C:\Users\user\Desktop\PALRGUCVEH.pdf
data
dropped
C:\Users\user\Desktop\PIVFAGEAAV.docx
data
dropped
C:\Users\user\Desktop\SQSJKEBWDT.docx
data
dropped
C:\Users\user\Desktop\SQSJKEBWDT.pdf
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP.jpg
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP.mp3
data
dropped
C:\Users\user\Desktop\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Documents\BJZFPPWAPT.jpg
data
dropped
C:\Users\user\Documents\BNAGMGSPLO.docx
data
dropped
C:\Users\user\Documents\BNAGMGSPLO.xlsx
data
dropped
C:\Users\user\Documents\DUUDTUBZFW.png
data
dropped
C:\Users\user\Documents\EEGWXUHVUG.jpg
data
dropped
C:\Users\user\Documents\EEGWXUHVUG.xlsx
data
dropped
C:\Users\user\Documents\EFOYFBOLXA.mp3
data
dropped
C:\Users\user\Documents\EFOYFBOLXA.pdf
data
dropped
C:\Users\user\Documents\EFOYFBOLXA.xlsx
data
dropped
C:\Users\user\Documents\GIGIYTFFYT.png
data
dropped
C:\Users\user\Documents\JDDHMPCDUJ.mp3
data
dropped
C:\Users\user\Documents\NVWZAPQSQL.png
data
dropped
C:\Users\user\Documents\PALRGUCVEH.pdf
data
dropped
C:\Users\user\Documents\PIVFAGEAAV.docx
data
dropped
C:\Users\user\Documents\SQSJKEBWDT.docx
data
dropped
C:\Users\user\Documents\SQSJKEBWDT.pdf
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP.jpg
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP.mp3
data
dropped
C:\Users\user\Documents\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Downloads\BJZFPPWAPT.jpg
data
dropped
C:\Users\user\Downloads\BNAGMGSPLO.docx
data
dropped
C:\Users\user\Downloads\BNAGMGSPLO.xlsx
data
dropped
C:\Users\user\Downloads\DUUDTUBZFW.png
data
dropped
C:\Users\user\Downloads\EEGWXUHVUG.jpg
data
dropped
C:\Users\user\Downloads\EEGWXUHVUG.xlsx
data
dropped
C:\Users\user\Downloads\EFOYFBOLXA.mp3
data
dropped
C:\Users\user\Downloads\EFOYFBOLXA.pdf
data
dropped
C:\Users\user\Downloads\EFOYFBOLXA.xlsx
data
dropped
C:\Users\user\Downloads\GIGIYTFFYT.png
data
dropped
C:\Users\user\Downloads\JDDHMPCDUJ.mp3
data
dropped
C:\Users\user\Downloads\NVWZAPQSQL.png
data
dropped
C:\Users\user\Downloads\PALRGUCVEH.pdf
data
dropped
C:\Users\user\Downloads\PIVFAGEAAV.docx
data
dropped
C:\Users\user\Downloads\SQSJKEBWDT.docx
data
dropped
C:\Users\user\Downloads\SQSJKEBWDT.pdf
data
dropped
C:\Users\user\Downloads\ZGGKNSUKOP.jpg
data
dropped
C:\Users\user\Downloads\ZGGKNSUKOP.mp3
data
dropped
C:\Users\user\Downloads\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Favorites\Amazon.url
data
dropped
C:\Users\user\Favorites\Bing.url
data
dropped
C:\Users\user\Favorites\Facebook.url
data
dropped
C:\Users\user\Favorites\Google.url
data
dropped
C:\Users\user\Favorites\Live.url
data
dropped
C:\Users\user\Favorites\NYTimes.url
data
dropped
C:\Users\user\Favorites\Reddit.url
data
dropped
C:\Users\user\Favorites\Twitter.url
data
dropped
C:\Users\user\Favorites\Wikipedia.url
data
dropped
C:\Users\user\Favorites\Youtube.url
data
dropped
C:\Users\user\Favorites\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Links\Desktop.lnk
data
dropped
C:\Users\user\Links\Downloads.lnk
zlib compressed data
dropped
C:\Users\user\Links\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Music\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Pictures\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Recent\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Saved Games\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Searches\Everywhere.search-ms
data
dropped
C:\Users\user\Searches\Indexed Locations.search-ms
data
dropped
C:\Users\user\Searches\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Searches\winrt--{S-1-5-21-2246122658-3693405117-2476756634-1003}-.searchconnector-ms
data
dropped
C:\Users\user\Videos\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\_curlrc
data
dropped
C:\Users\user\instructions_read_me.txt
ASCII text, with CRLF line terminators
dropped
There are 942 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\AztyGMg4jw.dll,VisibleEntry
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\AztyGMg4jw.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\AztyGMg4jw.dll",VisibleEntry
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\AztyGMg4jw.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AztyGMg4jw.dll",#1

URLs

Name
IP
Malicious
https://www.torproject.org/
unknown
malicious
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
unknown
malicious
https://html.spec.whatwg.org/#flow-content-3
unknown
http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
unknown
https://w3c.github.io/mathml-core/#dfn-maction
unknown
https://developers.google.com/safe-browsing/v4/advisory
unknown
https://design.firefox.com/photon/components/message-bars.html#type-specific-style
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://www.autoitscript.com/autoit3/
unknown
http://dev.w3.org/html5/spec/rendering.html#rendering
unknown
https://blocked.cdn.mozilla.net/%blockID%.html
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windows
unknown
https://mathiasbynens.be/notes/javascript-escapes#single
unknown
http://crl.microsg
unknown
https://github.com/whatwg/html/issues/8610
unknown
https://github.com/lit/lit/issues/1266
unknown
https://services.addons.mozilla.o
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://firefox-source-docs.mozilla.org/performance/scroll-linked_effects.html
unknown
https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
unknown
https://mozilla-ohttp-fakespot.fastly-edge.com/
unknown
https://html.spec.whatwg.org/#the-hr-element-2
unknown
https://w3c.github.io/mathml-core/#the-mathvariant-attribute
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTab
unknown
https://drafts.csswg.org/css-lists-3/#ua-stylesheet
unknown
https://developers.google.cB
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://mozilla.org0/
unknown
https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
unknown
https://api.accounts.firefox.com/v1
unknown
https://tc39.github.io/ecma262/#sec-typeof-operator
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
http://jsperf.com/code-review-1480
unknown
https://%LOCALE%.malware-error.mozilla.com/?url=
unknown
https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
unknown
https://%LOCALE%.phish-report.mozilla.com/?url=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1607439
unknown
https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
unknown
http://detectportal.firefox.com/canonical.html
unknown
https://developers.google.c
unknown
https://github.com/microsoft/TypeScript/issues/338).
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
unknown
https://dap-02.api.divviup.org
unknown
https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1403293
unknown
http://www.ethiopic.org/Collation/OrderedLists.html.
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#E
unknown
https://extensionworkshop.com/documentation/publish/self-distribution/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://html.spec.whatwg.org/#the-details-and-summary-elements
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://crbug.com/993268
unknown
https://webcompat.com/issues/new
unknown
https://developer.mozilla.org/en-US/docs/Web/CSS/visibility#Values
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://helper1.dap.cloudflareresearch.com/v02
unknown
http://file://sftldr.dllsftldr_wow64.dllIsProcessHookedAppVEntSubsystems32.dllAppVIsvSubsystems32.wK
unknown
https://%LOCALE%.phish-error.mozilla.com/?url=
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://support.mozilla.org/kb/captive-portal
unknown
https://blocked.cdn.mozilla.net/
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://github.com/w3c/csswg-drafts/issues/1072
unknown
https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
unknown
https://developer.mozilla.org/en-US/docs/Mozilla/Tech/Places/Frecency_algorithm
unknown
https://tools.ietf.org/html/rfc7515#appendix-C)
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
unknown
https://mathiasbynens.be/
unknown
http://mozilla.or
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1592344
unknown
https://mathiasbynens.be/notes/javascript-encoding#surrogate-formulae
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://html.spec.whatwg.org/#bidi-rendering
unknown
https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1539075
unknown
https://datatracker.ietf.org/doc/html/rfc7515#section-4.1.5
unknown
https://drafts.csswg.org/css-scoping/#slots-in-shadow-tree
unknown
https://html.spec.whatwg.org/#hidden-elements
unknown
https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
unknown
http://mozilla.org
unknown
https://prod.ohtc
unknown
http://detectportal.firefox.com/success.txt?ipv6
unknown
https://github.com/mozilla-services/autograph/blob/main/signer/contentsignaturepki/README.md
unknown
https://developer.mozilla.org/docs/Web/API/Element/setPointerCapture
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
https://github.com/stylelint/stylelint/issues/6834
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryption
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
unknown
https://lit.dev/docs/templates/directives/#stylemap
unknown
https://webextensions.settings.services.mozilla.com/v1
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mmpt0z3lb\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter

Memdumps

Base Address
Regiontype
Protect
Malicious
2C84000
heap
page read and write
2C90000
heap
page read and write
2C9F000
heap
page read and write
2CC7000
heap
page read and write
2C3F000
heap
page read and write
2C8E000
heap
page read and write
2CCB000
heap
page read and write
2C94000
heap
page read and write
2C6A000
heap
page read and write
2C2A000
heap
page read and write
2CCE000
heap
page read and write
2C33000
heap
page read and write
2CB2000
heap
page read and write
2C96000
heap
page read and write
2C97000
heap
page read and write
2C1E000
heap
page read and write
2C77000
heap
page read and write
2C7C000
heap
page read and write
2CCA000
heap
page read and write
2C4D000
heap
page read and write
2C6C000
heap
page read and write
2C30000
heap
page read and write
4960000
direct allocation
page read and write
2C92000
heap
page read and write
49F8000
heap
page read and write
49EA000
heap
page read and write
6D223000
unkown
page read and write
4960000
direct allocation
page read and write
2C6F000
heap
page read and write
49EB000
heap
page read and write
2C94000
heap
page read and write
2C52000
heap
page read and write
2CA4000
heap
page read and write
2CCD000
heap
page read and write
2C9C000
heap
page read and write
2C76000
heap
page read and write
2C94000
heap
page read and write
2C51000
heap
page read and write
2C82000
heap
page read and write
4960000
direct allocation
page read and write
4A01000
heap
page read and write
2C71000
heap
page read and write
2CB0000
heap
page read and write
2C90000
heap
page read and write
2CCA000
heap
page read and write
4960000
direct allocation
page read and write
4A0F000
heap
page read and write
2CC0000
heap
page read and write
2C91000
heap
page read and write
4960000
direct allocation
page read and write
2CC8000
heap
page read and write
4960000
direct allocation
page read and write
2C71000
heap
page read and write
2C7C000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C24000
heap
page read and write
2C6B000
heap
page read and write
2C6E000
heap
page read and write
2CCE000
heap
page read and write
2C8D000
heap
page read and write
2C1E000
heap
page read and write
2C1C000
heap
page read and write
2C7C000
heap
page read and write
2C6E000
heap
page read and write
2C86000
heap
page read and write
2C58000
heap
page read and write
2CBA000
heap
page read and write
2C7C000
heap
page read and write
4A14000
heap
page read and write
2C4D000
heap
page read and write
2CC4000
heap
page read and write
4AC0000
direct allocation
page read and write
2C2C000
heap
page read and write
2C8A000
heap
page read and write
2C6A000
heap
page read and write
2C91000
heap
page read and write
2C95000
heap
page read and write
2CDB000
heap
page read and write
49C0000
direct allocation
page read and write
2CCC000
heap
page read and write
2C82000
heap
page read and write
2C7C000
heap
page read and write
2C1A000
heap
page read and write
2CCB000
heap
page read and write
4960000
direct allocation
page read and write
4A0A000
heap
page read and write
49FC000
heap
page read and write
2C26000
heap
page read and write
49F8000
heap
page read and write
2C4F000
heap
page read and write
2CDE000
heap
page read and write
2CC7000
heap
page read and write
2C9A000
heap
page read and write
2C94000
heap
page read and write
2C7C000
heap
page read and write
2C35000
heap
page read and write
2C1C000
heap
page read and write
2C90000
heap
page read and write
2C77000
heap
page read and write
2C4C000
heap
page read and write
2C86000
heap
page read and write
2C68000
heap
page read and write
49F4000
heap
page read and write
2C4C000
heap
page read and write
2C94000
heap
page read and write
2C93000
heap
page read and write
2C89000
heap
page read and write
4960000
direct allocation
page read and write
2C46000
heap
page read and write
2C7A000
heap
page read and write
2C41000
heap
page read and write
2C97000
heap
page read and write
2C9D000
heap
page read and write
2C27000
heap
page read and write
8E5000
heap
page read and write
2C99000
heap
page read and write
2CB2000
heap
page read and write
24D0000
heap
page read and write
2C7B000
heap
page read and write
2C4F000
heap
page read and write
4960000
direct allocation
page read and write
2CA9000
heap
page read and write
2C6E000
heap
page read and write
2C6E000
heap
page read and write
2CC8000
heap
page read and write
2C81000
heap
page read and write
2C86000
heap
page read and write
4A10000
heap
page read and write
2C8B000
heap
page read and write
2CA6000
heap
page read and write
2CC4000
heap
page read and write
2C6F000
heap
page read and write
2CB3000
heap
page read and write
2C6E000
heap
page read and write
2C9F000
heap
page read and write
2C92000
heap
page read and write
2CA7000
heap
page read and write
2C6A000
heap
page read and write
2C9F000
heap
page read and write
2C89000
heap
page read and write
2CC7000
heap
page read and write
2C96000
heap
page read and write
2C33000
heap
page read and write
2C4B000
heap
page read and write
2C7E000
heap
page read and write
4960000
direct allocation
page read and write
2CD6000
heap
page read and write
6D224000
unkown
page readonly
2CB8000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2C74000
heap
page read and write
2C22000
heap
page read and write
2C35000
heap
page read and write
2C85000
heap
page read and write
2C4F000
heap
page read and write
49E9000
heap
page read and write
2CC9000
heap
page read and write
2C62000
heap
page read and write
2C30000
heap
page read and write
2C23000
heap
page read and write
2C4C000
heap
page read and write
2CDB000
heap
page read and write
2C89000
heap
page read and write
2C6E000
heap
page read and write
2CC3000
heap
page read and write
2C5A000
heap
page read and write
2CDD000
heap
page read and write
2C24000
heap
page read and write
2C7E000
heap
page read and write
49D0000
direct allocation
page read and write
2C6E000
heap
page read and write
4AD0000
direct allocation
page read and write
49E1000
heap
page read and write
2CD2000
heap
page read and write
2CC7000
heap
page read and write
2C7E000
heap
page read and write
2C6E000
heap
page read and write
2C4B000
heap
page read and write
2C94000
heap
page read and write
2C35000
heap
page read and write
2C51000
heap
page read and write
2C8E000
heap
page read and write
2CA0000
heap
page read and write
4AC0000
direct allocation
page read and write
2CA0000
heap
page read and write
2C68000
heap
page read and write
2CA2000
heap
page read and write
4960000
direct allocation
page read and write
2CC9000
heap
page read and write
4A10000
heap
page read and write
2C96000
heap
page read and write
2C39000
heap
page read and write
2CDB000
heap
page read and write
2C35000
heap
page read and write
2CD2000
heap
page read and write
2CAC000
heap
page read and write
2C22000
heap
page read and write
2C5E000
heap
page read and write
49FC000
heap
page read and write
4960000
direct allocation
page read and write
2C1C000
heap
page read and write
2CC2000
heap
page read and write
2C8B000
heap
page read and write
2CC1000
heap
page read and write
2CD4000
heap
page read and write
2CC9000
heap
page read and write
2C6A000
heap
page read and write
2C89000
heap
page read and write
2C85000
heap
page read and write
2CDB000
heap
page read and write
2C45000
heap
page read and write
4960000
direct allocation
page read and write
2CB6000
heap
page read and write
2C71000
heap
page read and write
2C94000
heap
page read and write
2C96000
heap
page read and write
2C43000
heap
page read and write
49C0000
direct allocation
page read and write
4A17000
heap
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
2C36000
heap
page read and write
2C5E000
heap
page read and write
2CA4000
heap
page read and write
2C4A000
heap
page read and write
2C5C000
heap
page read and write
2C92000
heap
page read and write
2C2E000
heap
page read and write
2C27000
heap
page read and write
2C32000
heap
page read and write
2C99000
heap
page read and write
2C77000
heap
page read and write
4960000
direct allocation
page read and write
2CA1000
heap
page read and write
2C82000
heap
page read and write
2CAE000
heap
page read and write
2CA7000
heap
page read and write
4A01000
heap
page read and write
2C87000
heap
page read and write
2C9F000
heap
page read and write
2CA6000
heap
page read and write
4960000
direct allocation
page read and write
2C26000
heap
page read and write
2C5F000
heap
page read and write
2C2A000
heap
page read and write
2C64000
heap
page read and write
2C32000
heap
page read and write
2C90000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C44000
heap
page read and write
2CA5000
heap
page read and write
2CC0000
heap
page read and write
2CCA000
heap
page read and write
2CC3000
heap
page read and write
2C44000
heap
page read and write
2C81000
heap
page read and write
2CDB000
heap
page read and write
2CDB000
heap
page read and write
2CC1000
heap
page read and write
2C6E000
heap
page read and write
2CC7000
heap
page read and write
2CC9000
heap
page read and write
2C9F000
heap
page read and write
2C94000
heap
page read and write
2C98000
heap
page read and write
2CA7000
heap
page read and write
2CA7000
heap
page read and write
2C40000
heap
page read and write
2CAE000
heap
page read and write
2C58000
heap
page read and write
2C9F000
heap
page read and write
2CC3000
heap
page read and write
AA5000
heap
page read and write
2C9B000
heap
page read and write
2C85000
heap
page read and write
2C2D000
heap
page read and write
2C65000
heap
page read and write
2C74000
heap
page read and write
2CC4000
heap
page read and write
2C31000
heap
page read and write
312F000
stack
page read and write
2C34000
heap
page read and write
49F1000
heap
page read and write
4960000
direct allocation
page read and write
2CBF000
heap
page read and write
49C0000
direct allocation
page read and write
2CA1000
heap
page read and write
2CA4000
heap
page read and write
2CCC000
heap
page read and write
2C22000
heap
page read and write
2CBF000
heap
page read and write
2CBF000
heap
page read and write
2CC7000
heap
page read and write
2C96000
heap
page read and write
2C7C000
heap
page read and write
2C92000
heap
page read and write
2CDB000
heap
page read and write
2C3A000
heap
page read and write
2C6B000
heap
page read and write
2CC0000
heap
page read and write
2CCC000
heap
page read and write
2CBE000
heap
page read and write
2C65000
heap
page read and write
2C7C000
heap
page read and write
2CB0000
heap
page read and write
2CBA000
heap
page read and write
2C90000
heap
page read and write
2C40000
heap
page read and write
2C7C000
heap
page read and write
2C36000
heap
page read and write
2CBA000
heap
page read and write
2C79000
heap
page read and write
2C9A000
heap
page read and write
2C96000
heap
page read and write
2C4B000
heap
page read and write
2CAC000
heap
page read and write
2C95000
heap
page read and write
2C29000
heap
page read and write
2C8E000
heap
page read and write
2CA0000
heap
page read and write
2C3A000
heap
page read and write
2CCE000
heap
page read and write
2C16000
heap
page read and write
2C6A000
heap
page read and write
49EA000
heap
page read and write
2C79000
heap
page read and write
24E0000
heap
page read and write
2C99000
heap
page read and write
4960000
direct allocation
page read and write
2CC4000
heap
page read and write
2CC3000
heap
page read and write
A9D000
heap
page read and write
2CA4000
heap
page read and write
2C35000
heap
page read and write
4A09000
heap
page read and write
2C85000
heap
page read and write
2CD4000
heap
page read and write
2C60000
heap
page read and write
4950000
direct allocation
page read and write
2CDB000
heap
page read and write
2C7E000
heap
page read and write
2C85000
heap
page read and write
2C52000
heap
page read and write
2C4F000
heap
page read and write
2CA9000
heap
page read and write
2C85000
heap
page read and write
49F2000
heap
page read and write
4AC0000
direct allocation
page read and write
2CB0000
heap
page read and write
2C85000
heap
page read and write
87E000
stack
page read and write
2C6F000
heap
page read and write
2C89000
heap
page read and write
4A08000
heap
page read and write
2CD4000
heap
page read and write
2C7C000
heap
page read and write
2C85000
heap
page read and write
2CC2000
heap
page read and write
2C86000
heap
page read and write
2C9D000
heap
page read and write
2C8C000
heap
page read and write
2C89000
heap
page read and write
4AD0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2CB3000
heap
page read and write
2CA7000
heap
page read and write
2C78000
heap
page read and write
2C85000
heap
page read and write
2CC9000
heap
page read and write
2CCB000
heap
page read and write
4960000
direct allocation
page read and write
2C37000
heap
page read and write
2C85000
heap
page read and write
2C7D000
heap
page read and write
2C92000
heap
page read and write
2C32000
heap
page read and write
2CA1000
heap
page read and write
2C9E000
heap
page read and write
2C51000
heap
page read and write
2C44000
heap
page read and write
2C2C000
heap
page read and write
2C37000
heap
page read and write
2C94000
heap
page read and write
2CA7000
heap
page read and write
2CCE000
heap
page read and write
2CD4000
heap
page read and write
2CC9000
heap
page read and write
2CBA000
heap
page read and write
2C5F000
heap
page read and write
2C26000
heap
page read and write
49EB000
heap
page read and write
2CDE000
heap
page read and write
2C24000
heap
page read and write
2CBB000
heap
page read and write
2C3B000
heap
page read and write
2C76000
heap
page read and write
2C4D000
heap
page read and write
2CD7000
heap
page read and write
2C40000
heap
page read and write
4960000
direct allocation
page read and write
2C4F000
heap
page read and write
2C5E000
heap
page read and write
4960000
direct allocation
page read and write
2C54000
heap
page read and write
2C3A000
heap
page read and write
2C35000
heap
page read and write
2C60000
heap
page read and write
2C1C000
heap
page read and write
2C7C000
heap
page read and write
2C44000
heap
page read and write
2CA9000
heap
page read and write
2CCC000
heap
page read and write
2C59000
heap
page read and write
2CC3000
heap
page read and write
2C30000
heap
page read and write
2C89000
heap
page read and write
2C92000
heap
page read and write
2CA4000
heap
page read and write
2C5A000
heap
page read and write
2C58000
heap
page read and write
4AE0000
direct allocation
page read and write
2C9B000
heap
page read and write
4AC0000
direct allocation
page read and write
2C94000
heap
page read and write
2CBF000
heap
page read and write
2C86000
heap
page read and write
2CC5000
heap
page read and write
4A08000
heap
page read and write
2C86000
heap
page read and write
2C35000
heap
page read and write
4AC0000
direct allocation
page read and write
C7F000
stack
page read and write
4960000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C38000
heap
page read and write
2C92000
heap
page read and write
2CB2000
heap
page read and write
2CB1000
heap
page read and write
2C60000
heap
page read and write
2CB0000
heap
page read and write
2C8D000
heap
page read and write
2CB6000
heap
page read and write
2C44000
heap
page read and write
2CC9000
heap
page read and write
4AD0000
direct allocation
page read and write
2C73000
heap
page read and write
2C51000
heap
page read and write
2C96000
heap
page read and write
4A0D000
heap
page read and write
2C87000
heap
page read and write
2C5E000
heap
page read and write
2CA0000
heap
page read and write
2C1C000
heap
page read and write
2C1C000
heap
page read and write
2CAC000
heap
page read and write
2CBB000
heap
page read and write
2CA5000
heap
page read and write
2C90000
heap
page read and write
2CBB000
heap
page read and write
2C65000
heap
page read and write
2C6E000
heap
page read and write
2C8C000
heap
page read and write
4960000
direct allocation
page read and write
2C85000
heap
page read and write
4A1D000
heap
page read and write
2C31000
heap
page read and write
4960000
direct allocation
page read and write
4950000
direct allocation
page read and write
2CCC000
heap
page read and write
2C40000
heap
page read and write
2C6C000
heap
page read and write
2C85000
heap
page read and write
2CBE000
heap
page read and write
2C58000
heap
page read and write
2C97000
heap
page read and write
2C8B000
heap
page read and write
2C92000
heap
page read and write
2C7C000
heap
page read and write
2CD1000
heap
page read and write
2CC9000
heap
page read and write
2C21000
heap
page read and write
2CA0000
heap
page read and write
2C6F000
heap
page read and write
2C50000
heap
page read and write
4A0A000
heap
page read and write
2CD7000
heap
page read and write
2C7E000
heap
page read and write
2C7C000
heap
page read and write
2C8A000
heap
page read and write
2C95000
heap
page read and write
2CC4000
heap
page read and write
2CCF000
heap
page read and write
2CC3000
heap
page read and write
2C71000
heap
page read and write
2C58000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2C36000
heap
page read and write
2CBF000
heap
page read and write
4960000
direct allocation
page read and write
2C46000
heap
page read and write
2C8D000
heap
page read and write
2CB3000
heap
page read and write
2C86000
heap
page read and write
2C62000
heap
page read and write
2C3B000
heap
page read and write
2CC0000
heap
page read and write
2C2C000
heap
page read and write
2C92000
heap
page read and write
2CCE000
heap
page read and write
2C52000
heap
page read and write
2C96000
heap
page read and write
4960000
direct allocation
page read and write
2C9A000
heap
page read and write
2C5E000
heap
page read and write
2C91000
heap
page read and write
2CC7000
heap
page read and write
2CCC000
heap
page read and write
2C85000
heap
page read and write
2C26000
heap
page read and write
2CC2000
heap
page read and write
2C5F000
heap
page read and write
2C52000
heap
page read and write
2C55000
heap
page read and write
2C82000
heap
page read and write
2CC9000
heap
page read and write
2C79000
heap
page read and write
2C5E000
heap
page read and write
49E5000
heap
page read and write
2CC6000
heap
page read and write
2CB3000
heap
page read and write
2C22000
heap
page read and write
2C94000
heap
page read and write
2C16000
heap
page read and write
2CAA000
heap
page read and write
2C8A000
heap
page read and write
49E1000
heap
page read and write
2C77000
heap
page read and write
2C49000
heap
page read and write
2C95000
heap
page read and write
2C90000
heap
page read and write
2C73000
heap
page read and write
2CCB000
heap
page read and write
4960000
direct allocation
page read and write
2CDC000
heap
page read and write
2C9F000
heap
page read and write
2C23000
heap
page read and write
2C58000
heap
page read and write
2C6E000
heap
page read and write
2C23000
heap
page read and write
2CD4000
heap
page read and write
2C44000
heap
page read and write
2CA4000
heap
page read and write
2C9F000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2C22000
heap
page read and write
2C86000
heap
page read and write
2CD7000
heap
page read and write
2C1E000
heap
page read and write
2C95000
heap
page read and write
2C9E000
heap
page read and write
4AD0000
direct allocation
page read and write
2CA2000
heap
page read and write
4AC0000
direct allocation
page read and write
2CA4000
heap
page read and write
2C71000
heap
page read and write
2C24000
heap
page read and write
2CC7000
heap
page read and write
2C7E000
heap
page read and write
2CCE000
heap
page read and write
2CA7000
heap
page read and write
4AD0000
direct allocation
page read and write
2CCF000
heap
page read and write
4960000
direct allocation
page read and write
2C86000
heap
page read and write
2CCC000
heap
page read and write
4AD0000
direct allocation
page read and write
2C9D000
heap
page read and write
2C86000
heap
page read and write
2C7C000
heap
page read and write
49F0000
heap
page read and write
2C8D000
heap
page read and write
2C6F000
heap
page read and write
2CB1000
heap
page read and write
2C44000
heap
page read and write
2CC6000
heap
page read and write
2C30000
heap
page read and write
2CD2000
heap
page read and write
2C59000
heap
page read and write
6D21E000
unkown
page write copy
2C7B000
heap
page read and write
2C58000
heap
page read and write
31EA000
heap
page read and write
2C72000
heap
page read and write
4960000
direct allocation
page read and write
2CC6000
heap
page read and write
2CC5000
heap
page read and write
2CA8000
heap
page read and write
2C32000
heap
page read and write
2C32000
heap
page read and write
2CC9000
heap
page read and write
2C97000
heap
page read and write
2CBA000
heap
page read and write
2C96000
heap
page read and write
2CC7000
heap
page read and write
2C9C000
heap
page read and write
49FC000
heap
page read and write
2C9F000
heap
page read and write
2CA5000
heap
page read and write
2C47000
heap
page read and write
2CC2000
heap
page read and write
2CC3000
heap
page read and write
2C73000
heap
page read and write
2C7C000
heap
page read and write
2C86000
heap
page read and write
2C85000
heap
page read and write
2C6A000
heap
page read and write
2CA8000
heap
page read and write
2CA8000
heap
page read and write
4AD0000
direct allocation
page read and write
2CBF000
heap
page read and write
2CA6000
heap
page read and write
2C43000
heap
page read and write
2CC0000
heap
page read and write
4960000
direct allocation
page read and write
2CBA000
heap
page read and write
2C65000
heap
page read and write
2C86000
heap
page read and write
2C61000
heap
page read and write
2CA9000
heap
page read and write
4AE0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2C1C000
heap
page read and write
2AC0000
direct allocation
page read and write
2CCF000
heap
page read and write
2C85000
heap
page read and write
2CB3000
heap
page read and write
2C6F000
heap
page read and write
4960000
direct allocation
page read and write
2C49000
heap
page read and write
2CCA000
heap
page read and write
2C45000
heap
page read and write
2CA4000
heap
page read and write
2CDB000
heap
page read and write
2CB2000
heap
page read and write
6D161000
unkown
page execute read
2CD4000
heap
page read and write
2C1C000
heap
page read and write
2C6E000
heap
page read and write
2C9B000
heap
page read and write
2C44000
heap
page read and write
4960000
direct allocation
page read and write
2CAA000
heap
page read and write
2C81000
heap
page read and write
2C37000
heap
page read and write
2C82000
heap
page read and write
2C9D000
heap
page read and write
2CCB000
heap
page read and write
2CBD000
heap
page read and write
2C6F000
heap
page read and write
4A1C000
heap
page read and write
2C91000
heap
page read and write
2C87000
heap
page read and write
4A13000
heap
page read and write
2C6E000
heap
page read and write
2C39000
heap
page read and write
2C49000
heap
page read and write
2C9C000
heap
page read and write
2C76000
heap
page read and write
2C89000
heap
page read and write
2CD7000
heap
page read and write
6D21C000
unkown
page read and write
49F8000
heap
page read and write
2C5B000
heap
page read and write
2C8B000
heap
page read and write
2C40000
heap
page read and write
2C2B000
heap
page read and write
2C79000
heap
page read and write
2CA8000
heap
page read and write
2C85000
heap
page read and write
2C4B000
heap
page read and write
2C3C000
heap
page read and write
2C45000
heap
page read and write
2AC0000
direct allocation
page read and write
49FA000
heap
page read and write
2DFC000
stack
page read and write
2C44000
heap
page read and write
2CB8000
heap
page read and write
2C72000
heap
page read and write
2C44000
heap
page read and write
2C9B000
heap
page read and write
2CCC000
heap
page read and write
2C9F000
heap
page read and write
2C52000
heap
page read and write
2CC3000
heap
page read and write
2C6F000
heap
page read and write
4960000
direct allocation
page read and write
2C44000
heap
page read and write
2C6E000
heap
page read and write
2C27000
heap
page read and write
2C2E000
heap
page read and write
2CCC000
heap
page read and write
2C7D000
heap
page read and write
2C6F000
heap
page read and write
2CC0000
heap
page read and write
4A28000
heap
page read and write
2CA6000
heap
page read and write
4A14000
heap
page read and write
2C6B000
heap
page read and write
2C96000
heap
page read and write
2CA5000
heap
page read and write
2CC0000
heap
page read and write
2C73000
heap
page read and write
2C86000
heap
page read and write
2CC9000
heap
page read and write
2C9A000
heap
page read and write
2CCA000
heap
page read and write
2C4C000
heap
page read and write
49C0000
direct allocation
page read and write
2C7C000
heap
page read and write
2CDB000
heap
page read and write
2C76000
heap
page read and write
2C2C000
heap
page read and write
2C96000
heap
page read and write
2C5C000
heap
page read and write
2C4F000
heap
page read and write
2C8E000
heap
page read and write
2CB0000
heap
page read and write
4960000
direct allocation
page read and write
2CC9000
heap
page read and write
2C89000
heap
page read and write
2C91000
heap
page read and write
2CAE000
heap
page read and write
2C3E000
heap
page read and write
49E8000
heap
page read and write
2C65000
heap
page read and write
2CAF000
heap
page read and write
2CD4000
heap
page read and write
2C9E000
heap
page read and write
2CCE000
heap
page read and write
2C62000
heap
page read and write
2CA7000
heap
page read and write
2CBE000
heap
page read and write
2C85000
heap
page read and write
2C9F000
heap
page read and write
2C9F000
heap
page read and write
2C81000
heap
page read and write
2CA8000
heap
page read and write
4AD0000
direct allocation
page read and write
2C43000
heap
page read and write
49FC000
heap
page read and write
2CC9000
heap
page read and write
2CA4000
heap
page read and write
2C3B000
heap
page read and write
2C95000
heap
page read and write
2C85000
heap
page read and write
2C29000
heap
page read and write
2C71000
heap
page read and write
2C66000
heap
page read and write
2C95000
heap
page read and write
4AC0000
direct allocation
page read and write
2C8E000
heap
page read and write
6D160000
unkown
page readonly
4A14000
heap
page read and write
2CC6000
heap
page read and write
49EE000
heap
page read and write
2C85000
heap
page read and write
2CCC000
heap
page read and write
49EF000
heap
page read and write
2CCC000
heap
page read and write
2CCA000
heap
page read and write
2C6F000
heap
page read and write
2C3B000
heap
page read and write
2CCA000
heap
page read and write
2C35000
heap
page read and write
2C36000
heap
page read and write
4AC0000
direct allocation
page read and write
2C61000
heap
page read and write
2CD4000
heap
page read and write
2C6C000
heap
page read and write
2C64000
heap
page read and write
2C86000
heap
page read and write
2CD7000
heap
page read and write
2C35000
heap
page read and write
2CC7000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2C97000
heap
page read and write
2C86000
heap
page read and write
2CD4000
heap
page read and write
2CC9000
heap
page read and write
2C1A000
heap
page read and write
4960000
direct allocation
page read and write
2CA8000
heap
page read and write
2C1C000
heap
page read and write
2C9A000
heap
page read and write
4A03000
heap
page read and write
2C85000
heap
page read and write
2CAF000
heap
page read and write
2C73000
heap
page read and write
2C7C000
heap
page read and write
2CBB000
heap
page read and write
2C4B000
heap
page read and write
2CCF000
heap
page read and write
2C3D000
heap
page read and write
2C3F000
heap
page read and write
2C26000
heap
page read and write
2C23000
heap
page read and write
2CCC000
heap
page read and write
2C9D000
heap
page read and write
2CA2000
heap
page read and write
2C26000
heap
page read and write
2C98000
heap
page read and write
2C74000
heap
page read and write
2C35000
heap
page read and write
49C7000
heap
page read and write
2CBA000
heap
page read and write
2C9F000
heap
page read and write
2C92000
heap
page read and write
2F00000
heap
page read and write
49F8000
heap
page read and write
2CA8000
heap
page read and write
2C4D000
heap
page read and write
2C90000
heap
page read and write
2C7E000
heap
page read and write
2C9F000
heap
page read and write
2CCA000
heap
page read and write
2C87000
heap
page read and write
2C9D000
heap
page read and write
2C7C000
heap
page read and write
2C3D000
heap
page read and write
2CA8000
heap
page read and write
2CC3000
heap
page read and write
2CCB000
heap
page read and write
2C4B000
heap
page read and write
2CDB000
heap
page read and write
2CA2000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2C4B000
heap
page read and write
2C1A000
heap
page read and write
49EF000
heap
page read and write
2C22000
heap
page read and write
2CA8000
heap
page read and write
2C6F000
heap
page read and write
2C9F000
heap
page read and write
2CC9000
heap
page read and write
2C28000
heap
page read and write
2C86000
heap
page read and write
2C5F000
heap
page read and write
2CA9000
heap
page read and write
2CD4000
heap
page read and write
2C8E000
heap
page read and write
2C38000
heap
page read and write
49F4000
heap
page read and write
2C9A000
heap
page read and write
2CA9000
heap
page read and write
2C6A000
heap
page read and write
2C85000
heap
page read and write
2C89000
heap
page read and write
49F9000
heap
page read and write
2C97000
heap
page read and write
2CA9000
heap
page read and write
2C52000
heap
page read and write
49F1000
heap
page read and write
2C1A000
heap
page read and write
2CA9000
heap
page read and write
2CDB000
heap
page read and write
2CC2000
heap
page read and write
2C2C000
heap
page read and write
2C6C000
heap
page read and write
2CCE000
heap
page read and write
2CCD000
heap
page read and write
4A11000
heap
page read and write
2C73000
heap
page read and write
2C26000
heap
page read and write
2CA7000
heap
page read and write
2C79000
heap
page read and write
7F0000
heap
page read and write
2C8E000
heap
page read and write
2C6F000
heap
page read and write
2CD6000
heap
page read and write
2C1C000
heap
page read and write
4A1D000
heap
page read and write
2CC3000
heap
page read and write
2C92000
heap
page read and write
31C0000
heap
page read and write
2C79000
heap
page read and write
2C7C000
heap
page read and write
2C2C000
heap
page read and write
2C37000
heap
page read and write
4960000
direct allocation
page read and write
2CAC000
heap
page read and write
2CB0000
heap
page read and write
2CC9000
heap
page read and write
2CBE000
heap
page read and write
2C6F000
heap
page read and write
2C94000
heap
page read and write
2C35000
heap
page read and write
2C51000
heap
page read and write
4AC0000
direct allocation
page read and write
2C26000
heap
page read and write
2C6F000
heap
page read and write
2C7E000
heap
page read and write
2C94000
heap
page read and write
2C6E000
heap
page read and write
2C35000
heap
page read and write
2CBE000
heap
page read and write
2C36000
heap
page read and write
2C49000
heap
page read and write
2CBA000
heap
page read and write
2CB0000
heap
page read and write
2CA7000
heap
page read and write
2C8B000
heap
page read and write
2C98000
heap
page read and write
2C92000
heap
page read and write
2CBC000
heap
page read and write
2C87000
heap
page read and write
2C4E000
heap
page read and write
2C28000
heap
page read and write
2CC7000
heap
page read and write
2C4C000
heap
page read and write
2CC7000
heap
page read and write
2C86000
heap
page read and write
2CBA000
heap
page read and write
2CCE000
heap
page read and write
2C44000
heap
page read and write
2C71000
heap
page read and write
2C96000
heap
page read and write
2CB3000
heap
page read and write
2C96000
heap
page read and write
2CC9000
heap
page read and write
2C35000
heap
page read and write
4AD0000
direct allocation
page read and write
2C5D000
heap
page read and write
2C6E000
heap
page read and write
2CCB000
heap
page read and write
2C5E000
heap
page read and write
2C66000
heap
page read and write
2AC0000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C8E000
heap
page read and write
2C6C000
heap
page read and write
2CA0000
heap
page read and write
2C9C000
heap
page read and write
2C87000
heap
page read and write
2CAE000
heap
page read and write
2C59000
heap
page read and write
2C6E000
heap
page read and write
2C1A000
heap
page read and write
2CBE000
heap
page read and write
2CB6000
heap
page read and write
2C8B000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2CBF000
heap
page read and write
2CC2000
heap
page read and write
2CBE000
heap
page read and write
2CC1000
heap
page read and write
2C86000
heap
page read and write
2C1C000
heap
page read and write
2CC7000
heap
page read and write
2C94000
heap
page read and write
2CD2000
heap
page read and write
2C6F000
heap
page read and write
2C5C000
heap
page read and write
2CA9000
heap
page read and write
2C68000
heap
page read and write
4A08000
heap
page read and write
2CDB000
heap
page read and write
2C37000
heap
page read and write
2CAE000
heap
page read and write
4AC0000
direct allocation
page read and write
2C9B000
heap
page read and write
2C2E000
heap
page read and write
2C47000
heap
page read and write
2C7C000
heap
page read and write
2F90000
heap
page read and write
2C81000
heap
page read and write
2C86000
heap
page read and write
2C8B000
heap
page read and write
4960000
direct allocation
page read and write
2C2D000
heap
page read and write
2C45000
heap
page read and write
2C2D000
heap
page read and write
2C98000
heap
page read and write
2C87000
heap
page read and write
2CBE000
heap
page read and write
2CA8000
heap
page read and write
2C31000
heap
page read and write
2C85000
heap
page read and write
4A08000
heap
page read and write
2CB3000
heap
page read and write
2C89000
heap
page read and write
2CA8000
heap
page read and write
4A0F000
heap
page read and write
49F1000
heap
page read and write
2C5F000
heap
page read and write
2C9F000
heap
page read and write
2C6A000
heap
page read and write
2CC4000
heap
page read and write
2C92000
heap
page read and write
2CC2000
heap
page read and write
2C3B000
heap
page read and write
2C71000
heap
page read and write
2C84000
heap
page read and write
2C2E000
heap
page read and write
2C35000
heap
page read and write
4960000
direct allocation
page read and write
2C85000
heap
page read and write
2C44000
heap
page read and write
2C29000
heap
page read and write
2C92000
heap
page read and write
2C53000
heap
page read and write
2C52000
heap
page read and write
2CDB000
heap
page read and write
6D1F8000
unkown
page readonly
2CDB000
heap
page read and write
2C35000
heap
page read and write
2C65000
heap
page read and write
2C94000
heap
page read and write
2CCC000
heap
page read and write
2CCB000
heap
page read and write
4AD0000
direct allocation
page read and write
2CBA000
heap
page read and write
2C4F000
heap
page read and write
2C36000
heap
page read and write
2C6F000
heap
page read and write
2C78000
heap
page read and write
2CA6000
heap
page read and write
2CDB000
heap
page read and write
2C4D000
heap
page read and write
2C8D000
heap
page read and write
2C2E000
heap
page read and write
49F8000
heap
page read and write
2C9E000
heap
page read and write
2C27000
heap
page read and write
2CA5000
heap
page read and write
4A01000
heap
page read and write
2CC6000
heap
page read and write
2C7C000
heap
page read and write
2C6C000
heap
page read and write
2CC7000
heap
page read and write
2C9D000
heap
page read and write
2C65000
heap
page read and write
49FB000
heap
page read and write
2C26000
heap
page read and write
4AC0000
direct allocation
page read and write
2C7C000
heap
page read and write
2C97000
heap
page read and write
2CB2000
heap
page read and write
4A06000
heap
page read and write
2CC0000
heap
page read and write
2C8D000
heap
page read and write
2C62000
heap
page read and write
2CB0000
heap
page read and write
2C97000
heap
page read and write
2CB8000
heap
page read and write
2C6F000
heap
page read and write
4A08000
heap
page read and write
2C77000
heap
page read and write
2C1A000
heap
page read and write
2C9F000
heap
page read and write
4A19000
heap
page read and write
2C29000
heap
page read and write
2C5C000
heap
page read and write
2C55000
heap
page read and write
49F5000
heap
page read and write
2C91000
heap
page read and write
4AC0000
direct allocation
page read and write
2CBD000
heap
page read and write
2CBD000
heap
page read and write
2C79000
heap
page read and write
2C7C000
heap
page read and write
2CC9000
heap
page read and write
2C85000
heap
page read and write
2CB7000
heap
page read and write
2C7C000
heap
page read and write
2CA7000
heap
page read and write
2C82000
heap
page read and write
2CBC000
heap
page read and write
2C6E000
heap
page read and write
2CC9000
heap
page read and write
2C92000
heap
page read and write
2C94000
heap
page read and write
2CB7000
heap
page read and write
2CD6000
heap
page read and write
2C6E000
heap
page read and write
2CA9000
heap
page read and write
2CA1000
heap
page read and write
2C92000
heap
page read and write
2C3F000
heap
page read and write
2C86000
heap
page read and write
2C44000
heap
page read and write
2C7F000
heap
page read and write
2C7C000
heap
page read and write
2C95000
heap
page read and write
2C99000
heap
page read and write
2CC3000
heap
page read and write
2C8B000
heap
page read and write
4A10000
heap
page read and write
2CDB000
heap
page read and write
2C79000
heap
page read and write
2C37000
heap
page read and write
2C9D000
heap
page read and write
2C7C000
heap
page read and write
2CA5000
heap
page read and write
2C89000
heap
page read and write
2C63000
heap
page read and write
2CCF000
heap
page read and write
2CA5000
heap
page read and write
2C6F000
heap
page read and write
2CB6000
heap
page read and write
2CDB000
heap
page read and write
6FC000
stack
page read and write
2C9F000
heap
page read and write
2C31000
heap
page read and write
2CA1000
heap
page read and write
2C94000
heap
page read and write
2C55000
heap
page read and write
2C2E000
heap
page read and write
2C96000
heap
page read and write
2C8B000
heap
page read and write
49FC000
heap
page read and write
2CD4000
heap
page read and write
2CB3000
heap
page read and write
2C99000
heap
page read and write
2C7C000
heap
page read and write
2C85000
heap
page read and write
2C85000
heap
page read and write
2C7C000
heap
page read and write
4960000
direct allocation
page read and write
2C65000
heap
page read and write
2CC9000
heap
page read and write
2CA4000
heap
page read and write
2CA3000
heap
page read and write
2C35000
heap
page read and write
2C9D000
heap
page read and write
4950000
direct allocation
page read and write
2CA8000
heap
page read and write
4960000
direct allocation
page read and write
2CCE000
heap
page read and write
4AD0000
direct allocation
page read and write
2CAE000
heap
page read and write
2C2A000
heap
page read and write
2C5E000
heap
page read and write
2C95000
heap
page read and write
2CC5000
heap
page read and write
2C21000
heap
page read and write
2C50000
heap
page read and write
2C33000
heap
page read and write
2C2C000
heap
page read and write
4A08000
heap
page read and write
2C9F000
heap
page read and write
2CAE000
heap
page read and write
2C9F000
heap
page read and write
4960000
direct allocation
page read and write
2C44000
heap
page read and write
2C86000
heap
page read and write
2CA0000
heap
page read and write
2C76000
heap
page read and write
2C94000
heap
page read and write
4AC0000
direct allocation
page read and write
2C6A000
heap
page read and write
2C62000
heap
page read and write
2C6A000
heap
page read and write
2C6C000
heap
page read and write
2C85000
heap
page read and write
2C98000
heap
page read and write
2CA4000
heap
page read and write
2C52000
heap
page read and write
2C2A000
heap
page read and write
2CC9000
heap
page read and write
6D21E000
unkown
page write copy
2C66000
heap
page read and write
2C60000
heap
page read and write
2C3D000
heap
page read and write
2C6E000
heap
page read and write
2C91000
heap
page read and write
2CC0000
heap
page read and write
2CC2000
heap
page read and write
2C85000
heap
page read and write
2C94000
heap
page read and write
2C1A000
heap
page read and write
2C9F000
heap
page read and write
2C92000
heap
page read and write
2CC2000
heap
page read and write
2CB0000
heap
page read and write
2C35000
heap
page read and write
2C5E000
heap
page read and write
2C77000
heap
page read and write
2C6E000
heap
page read and write
4AC0000
direct allocation
page read and write
2C1A000
heap
page read and write
2CDB000
heap
page read and write
4950000
direct allocation
page read and write
49F7000
heap
page read and write
2C35000
heap
page read and write
4950000
direct allocation
page read and write
49F1000
heap
page read and write
2CB6000
heap
page read and write
2CA0000
heap
page read and write
2C35000
heap
page read and write
2C30000
heap
page read and write
2C53000
heap
page read and write
2CB6000
heap
page read and write
2CCC000
heap
page read and write
2CCC000
heap
page read and write
2C6B000
heap
page read and write
2C85000
heap
page read and write
4960000
direct allocation
page read and write
2C97000
heap
page read and write
2DBB000
stack
page read and write
2C65000
heap
page read and write
4AC0000
direct allocation
page read and write
2C2F000
heap
page read and write
4960000
direct allocation
page read and write
2C1C000
heap
page read and write
2CBA000
heap
page read and write
49F0000
heap
page read and write
4960000
direct allocation
page read and write
2C65000
heap
page read and write
4960000
direct allocation
page read and write
2C58000
heap
page read and write
2C6E000
heap
page read and write
2C9B000
heap
page read and write
2C91000
heap
page read and write
2C9F000
heap
page read and write
2C2D000
heap
page read and write
4A21000
heap
page read and write
2C74000
heap
page read and write
2CC9000
heap
page read and write
2C2A000
heap
page read and write
2C3A000
heap
page read and write
2CBB000
heap
page read and write
2C95000
heap
page read and write
49F0000
heap
page read and write
6D221000
unkown
page read and write
4AC0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2C4E000
heap
page read and write
2C52000
heap
page read and write
2CA8000
heap
page read and write
2CA4000
heap
page read and write
2C35000
heap
page read and write
2C6F000
heap
page read and write
4AC0000
direct allocation
page read and write
2C9F000
heap
page read and write
2C85000
heap
page read and write
4AD0000
direct allocation
page read and write
2C33000
heap
page read and write
2C36000
heap
page read and write
2C95000
heap
page read and write
2CAF000
heap
page read and write
2C96000
heap
page read and write
2CB0000
heap
page read and write
2C31000
heap
page read and write
2CA7000
heap
page read and write
2CA9000
heap
page read and write
4AC0000
direct allocation
page read and write
2C1A000
heap
page read and write
2C27000
heap
page read and write
2C65000
heap
page read and write
2C7D000
heap
page read and write
2CC7000
heap
page read and write
2CAA000
heap
page read and write
2CCA000
heap
page read and write
2C86000
heap
page read and write
2C61000
heap
page read and write
2C62000
heap
page read and write
2C6F000
heap
page read and write
2C99000
heap
page read and write
2C60000
heap
page read and write
2C35000
heap
page read and write
2CA8000
heap
page read and write
2C9B000
heap
page read and write
2C7E000
heap
page read and write
2CA9000
heap
page read and write
2C37000
heap
page read and write
4960000
direct allocation
page read and write
2C81000
heap
page read and write
2CBB000
heap
page read and write
2CC7000
heap
page read and write
2C5F000
heap
page read and write
2CB0000
heap
page read and write
2CDE000
heap
page read and write
2C9D000
heap
page read and write
2C82000
heap
page read and write
4960000
direct allocation
page read and write
2C8C000
heap
page read and write
2CA2000
heap
page read and write
2C89000
heap
page read and write
2CD4000
heap
page read and write
2CDB000
heap
page read and write
2C9F000
heap
page read and write
2C21000
heap
page read and write
2C1A000
heap
page read and write
2C96000
heap
page read and write
2C6E000
heap
page read and write
2CA5000
heap
page read and write
2C97000
heap
page read and write
2C8E000
heap
page read and write
49FA000
heap
page read and write
2C31000
heap
page read and write
2C89000
heap
page read and write
2C5E000
heap
page read and write
2C77000
heap
page read and write
2C79000
heap
page read and write
2C1A000
heap
page read and write
2CA7000
heap
page read and write
2C48000
heap
page read and write
2CBA000
heap
page read and write
2C30000
heap
page read and write
2CBC000
heap
page read and write
2C85000
heap
page read and write
2C86000
heap
page read and write
2CBD000
heap
page read and write
2C27000
heap
page read and write
2CC3000
heap
page read and write
2C97000
heap
page read and write
2CCC000
heap
page read and write
2C91000
heap
page read and write
2C6E000
heap
page read and write
2CC7000
heap
page read and write
2CBA000
heap
page read and write
49FA000
heap
page read and write
2C46000
heap
page read and write
2C5A000
heap
page read and write
2C3B000
heap
page read and write
2CC9000
heap
page read and write
2C85000
heap
page read and write
2C29000
heap
page read and write
2C31000
heap
page read and write
2C94000
heap
page read and write
2C35000
heap
page read and write
2C5C000
heap
page read and write
4A08000
heap
page read and write
2C68000
heap
page read and write
A8B000
heap
page read and write
2CA9000
heap
page read and write
2C86000
heap
page read and write
2C9F000
heap
page read and write
2CCA000
heap
page read and write
2CB0000
heap
page read and write
4960000
direct allocation
page read and write
2C6C000
heap
page read and write
2C3E000
heap
page read and write
2C4B000
heap
page read and write
4AC0000
direct allocation
page read and write
2C8A000
heap
page read and write
4AC0000
direct allocation
page read and write
2CB3000
heap
page read and write
3AC000
stack
page read and write
2C8B000
heap
page read and write
2C9D000
heap
page read and write
2CA7000
heap
page read and write
2C30000
heap
page read and write
2CCE000
heap
page read and write
2CA0000
heap
page read and write
2C85000
heap
page read and write
2CD2000
heap
page read and write
4A10000
heap
page read and write
2C96000
heap
page read and write
4A11000
heap
page read and write
2C7D000
heap
page read and write
2C96000
heap
page read and write
4AC0000
direct allocation
page read and write
2C49000
heap
page read and write
2C94000
heap
page read and write
2C65000
heap
page read and write
2C7C000
heap
page read and write
4A0A000
heap
page read and write
2CDB000
heap
page read and write
2C6E000
heap
page read and write
2CA4000
heap
page read and write
2C5E000
heap
page read and write
2CC0000
heap
page read and write
2CA0000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C9B000
heap
page read and write
2CBB000
heap
page read and write
2C96000
heap
page read and write
2C85000
heap
page read and write
4960000
direct allocation
page read and write
2CC9000
heap
page read and write
2C7C000
heap
page read and write
2CC9000
heap
page read and write
2C62000
heap
page read and write
2CCF000
heap
page read and write
2C89000
heap
page read and write
2CB7000
heap
page read and write
2CA0000
heap
page read and write
2C9B000
heap
page read and write
2C8C000
heap
page read and write
2C86000
heap
page read and write
2C26000
heap
page read and write
2CB0000
heap
page read and write
2C9C000
heap
page read and write
4950000
direct allocation
page read and write
2CB3000
heap
page read and write
2C2D000
heap
page read and write
4AD0000
direct allocation
page read and write
49FF000
heap
page read and write
2CBE000
heap
page read and write
2C97000
heap
page read and write
2C35000
heap
page read and write
2C82000
heap
page read and write
2C30000
heap
page read and write
2CA6000
heap
page read and write
2C8E000
heap
page read and write
2C1C000
heap
page read and write
2C39000
heap
page read and write
2C85000
heap
page read and write
4A14000
heap
page read and write
2CDB000
heap
page read and write
2C6C000
heap
page read and write
2C8B000
heap
page read and write
2C84000
heap
page read and write
2C9C000
heap
page read and write
2C77000
heap
page read and write
2CBF000
heap
page read and write
2C8C000
heap
page read and write
2C9F000
heap
page read and write
2C9F000
heap
page read and write
4960000
direct allocation
page read and write
2C89000
heap
page read and write
2C7D000
heap
page read and write
2C32000
heap
page read and write
2C90000
heap
page read and write
2C96000
heap
page read and write
2C1C000
heap
page read and write
2C89000
heap
page read and write
2C7C000
heap
page read and write
2C4B000
heap
page read and write
2C7E000
heap
page read and write
2CC2000
heap
page read and write
2C9C000
heap
page read and write
2C76000
heap
page read and write
2C77000
heap
page read and write
2C44000
heap
page read and write
2C54000
heap
page read and write
2C29000
heap
page read and write
2C92000
heap
page read and write
4960000
direct allocation
page read and write
2C82000
heap
page read and write
2C87000
heap
page read and write
2C94000
heap
page read and write
2C94000
heap
page read and write
4960000
direct allocation
page read and write
2CB7000
heap
page read and write
49F9000
heap
page read and write
2CBA000
heap
page read and write
2C85000
heap
page read and write
2CA4000
heap
page read and write
2CD2000
heap
page read and write
2CC9000
heap
page read and write
2C6C000
heap
page read and write
2C7D000
heap
page read and write
2CBF000
heap
page read and write
2C6E000
heap
page read and write
49F1000
heap
page read and write
2C2F000
heap
page read and write
2CCC000
heap
page read and write
2C8C000
heap
page read and write
2C95000
heap
page read and write
2CDB000
heap
page read and write
2CBB000
heap
page read and write
4AD0000
direct allocation
page read and write
2CD5000
heap
page read and write
2C92000
heap
page read and write
2CCC000
heap
page read and write
2C86000
heap
page read and write
2CCF000
heap
page read and write
2C5E000
heap
page read and write
2C4C000
heap
page read and write
2CCE000
heap
page read and write
2CA2000
heap
page read and write
2C46000
heap
page read and write
2CC1000
heap
page read and write
2C86000
heap
page read and write
2C60000
heap
page read and write
2C22000
heap
page read and write
2C64000
heap
page read and write
4960000
direct allocation
page read and write
2C6F000
heap
page read and write
2CAF000
heap
page read and write
2C1E000
heap
page read and write
2CBA000
heap
page read and write
2C7E000
heap
page read and write
2C45000
heap
page read and write
6D218000
unkown
page write copy
2C35000
heap
page read and write
49F1000
heap
page read and write
2C85000
heap
page read and write
2C91000
heap
page read and write
2C6C000
heap
page read and write
4AC0000
direct allocation
page read and write
2C9B000
heap
page read and write
83E000
stack
page read and write
2C6E000
heap
page read and write
2C22000
heap
page read and write
2C86000
heap
page read and write
2C35000
heap
page read and write
4AC0000
direct allocation
page read and write
2C47000
heap
page read and write
2C9D000
heap
page read and write
2C92000
heap
page read and write
2C61000
heap
page read and write
4960000
direct allocation
page read and write
2C4F000
heap
page read and write
2C95000
heap
page read and write
2C9F000
heap
page read and write
2C8D000
heap
page read and write
2C4C000
heap
page read and write
2C7D000
heap
page read and write
2C65000
heap
page read and write
2C6C000
heap
page read and write
2C82000
heap
page read and write
2CA2000
heap
page read and write
2CB7000
heap
page read and write
2CC5000
heap
page read and write
4960000
direct allocation
page read and write
2C6F000
heap
page read and write
2C87000
heap
page read and write
2C5A000
heap
page read and write
2C60000
heap
page read and write
2CBF000
heap
page read and write
4960000
direct allocation
page read and write
2CA9000
heap
page read and write
2C8B000
heap
page read and write
2CA0000
heap
page read and write
2C8D000
heap
page read and write
4AD0000
direct allocation
page read and write
A80000
heap
page read and write
2CA1000
heap
page read and write
2CBC000
heap
page read and write
4A08000
heap
page read and write
4960000
direct allocation
page read and write
2CD4000
heap
page read and write
4AD0000
direct allocation
page read and write
2C88000
heap
page read and write
4960000
direct allocation
page read and write
2CC4000
heap
page read and write
2CA7000
heap
page read and write
2C2C000
heap
page read and write
2CC9000
heap
page read and write
2C92000
heap
page read and write
4AD0000
direct allocation
page read and write
2C7C000
heap
page read and write
2CA0000
heap
page read and write
2CCC000
heap
page read and write
4960000
direct allocation
page read and write
2C7C000
heap
page read and write
2C4B000
heap
page read and write
2CA1000
heap
page read and write
2CC9000
heap
page read and write
2CA0000
heap
page read and write
2C6E000
heap
page read and write
4AC0000
direct allocation
page read and write
4A0C000
heap
page read and write
2CD6000
heap
page read and write
2CC7000
heap
page read and write
2CA1000
heap
page read and write
2C44000
heap
page read and write
2CBA000
heap
page read and write
2C6E000
heap
page read and write
2C35000
heap
page read and write
2C9F000
heap
page read and write
2CC4000
heap
page read and write
49F0000
heap
page read and write
2C8A000
heap
page read and write
4AC0000
direct allocation
page read and write
2C89000
heap
page read and write
2C85000
heap
page read and write
49F1000
heap
page read and write
2C52000
heap
page read and write
2CA7000
heap
page read and write
2C44000
heap
page read and write
2C8E000
heap
page read and write
2C35000
heap
page read and write
2C97000
heap
page read and write
2C7A000
heap
page read and write
2CC7000
heap
page read and write
2C97000
heap
page read and write
2C45000
heap
page read and write
2CC9000
heap
page read and write
2CA6000
heap
page read and write
2CB6000
heap
page read and write
4960000
direct allocation
page read and write
2CC7000
heap
page read and write
2CCA000
heap
page read and write
6D223000
unkown
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
4A1D000
heap
page read and write
2C31000
heap
page read and write
2CD1000
heap
page read and write
4960000
direct allocation
page read and write
49EC000
heap
page read and write
2CC9000
heap
page read and write
2CC4000
heap
page read and write
49F8000
heap
page read and write
2CA4000
heap
page read and write
4960000
direct allocation
page read and write
2C71000
heap
page read and write
4A10000
heap
page read and write
2CBD000
heap
page read and write
2C64000
heap
page read and write
2C65000
heap
page read and write
2C1C000
heap
page read and write
2C92000
heap
page read and write
2CC7000
heap
page read and write
2CC0000
heap
page read and write
2C8A000
heap
page read and write
2C49000
heap
page read and write
2CCF000
heap
page read and write
2C5F000
heap
page read and write
2C94000
heap
page read and write
2C65000
heap
page read and write
2CC7000
heap
page read and write
2C40000
heap
page read and write
2C92000
heap
page read and write
2C5C000
heap
page read and write
4960000
direct allocation
page read and write
2C85000
heap
page read and write
2C99000
heap
page read and write
2C96000
heap
page read and write
2C1C000
heap
page read and write
2C74000
heap
page read and write
3060000
heap
page read and write
2CBC000
heap
page read and write
2CA9000
heap
page read and write
2C7E000
heap
page read and write
2C73000
heap
page read and write
4AC0000
direct allocation
page read and write
2C94000
heap
page read and write
2CC6000
heap
page read and write
2C4D000
heap
page read and write
2C31000
heap
page read and write
2C8D000
heap
page read and write
2CAE000
heap
page read and write
49F9000
heap
page read and write
2C3C000
heap
page read and write
2C34000
heap
page read and write
2C9F000
heap
page read and write
2C6C000
heap
page read and write
2C8E000
heap
page read and write
2C86000
heap
page read and write
2C3D000
heap
page read and write
2CA0000
heap
page read and write
2CC9000
heap
page read and write
2C95000
heap
page read and write
2CCB000
heap
page read and write
2C43000
heap
page read and write
2C79000
heap
page read and write
2CA9000
heap
page read and write
2C62000
heap
page read and write
2C86000
heap
page read and write
2C1F000
heap
page read and write
2CDE000
heap
page read and write
2CA1000
heap
page read and write
2C43000
heap
page read and write
2C94000
heap
page read and write
2C9C000
heap
page read and write
2C9D000
heap
page read and write
2CA7000
heap
page read and write
2C6B000
heap
page read and write
2CC9000
heap
page read and write
2C9F000
heap
page read and write
2C5E000
heap
page read and write
2CBA000
heap
page read and write
2C94000
heap
page read and write
4960000
direct allocation
page read and write
2CBD000
heap
page read and write
2C1A000
heap
page read and write
2C90000
heap
page read and write
2C27000
heap
page read and write
2C2D000
heap
page read and write
2C47000
heap
page read and write
4960000
direct allocation
page read and write
2CA0000
heap
page read and write
2CA9000
heap
page read and write
2C36000
heap
page read and write
2CA2000
heap
page read and write
4960000
direct allocation
page read and write
2C7C000
heap
page read and write
2C44000
heap
page read and write
2C3E000
heap
page read and write
2C91000
heap
page read and write
2CD2000
heap
page read and write
2C97000
heap
page read and write
4AC0000
direct allocation
page read and write
2CC1000
heap
page read and write
4960000
direct allocation
page read and write
2C7B000
heap
page read and write
2CA2000
heap
page read and write
2C9E000
heap
page read and write
2C9F000
heap
page read and write
2CA0000
heap
page read and write
2CC3000
heap
page read and write
2CCF000
heap
page read and write
2CCB000
heap
page read and write
2C3C000
heap
page read and write
2CB3000
heap
page read and write
2CA5000
heap
page read and write
30EE000
stack
page read and write
4960000
direct allocation
page read and write
2C85000
heap
page read and write
2CC9000
heap
page read and write
2C43000
heap
page read and write
2C87000
heap
page read and write
2C96000
heap
page read and write
2C47000
heap
page read and write
2C9D000
heap
page read and write
2C37000
heap
page read and write
2C8E000
heap
page read and write
2C8E000
heap
page read and write
2C87000
heap
page read and write
2CDB000
heap
page read and write
2C6B000
heap
page read and write
2C82000
heap
page read and write
2CA0000
heap
page read and write
2C9B000
heap
page read and write
4AC0000
direct allocation
page read and write
2C30000
heap
page read and write
2CA8000
heap
page read and write
2C35000
heap
page read and write
2C35000
heap
page read and write
2C8D000
heap
page read and write
2C82000
heap
page read and write
2C85000
heap
page read and write
2C85000
heap
page read and write
2C6A000
heap
page read and write
2C94000
heap
page read and write
30D0000
heap
page read and write
2CBB000
heap
page read and write
2C45000
heap
page read and write
4960000
direct allocation
page read and write
2C45000
heap
page read and write
2C22000
heap
page read and write
2CA9000
heap
page read and write
2C6C000
heap
page read and write
4A08000
heap
page read and write
2C9F000
heap
page read and write
2CC7000
heap
page read and write
2C58000
heap
page read and write
2CA7000
heap
page read and write
49E4000
heap
page read and write
2BCE000
stack
page read and write
2C49000
heap
page read and write
2C5C000
heap
page read and write
2C31000
heap
page read and write
2CA8000
heap
page read and write
2C7C000
heap
page read and write
4AD0000
direct allocation
page read and write
4960000
direct allocation
page read and write
4A13000
heap
page read and write
2C42000
heap
page read and write
2CB0000
heap
page read and write
2CC8000
heap
page read and write
2C97000
heap
page read and write
4950000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C53000
heap
page read and write
8E0000
heap
page read and write
2CBA000
heap
page read and write
2C92000
heap
page read and write
4AC0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2C62000
heap
page read and write
2CC1000
heap
page read and write
2CC2000
heap
page read and write
2C86000
heap
page read and write
49C0000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C94000
heap
page read and write
2C2A000
heap
page read and write
2C82000
heap
page read and write
2CC7000
heap
page read and write
2C7C000
heap
page read and write
2CBE000
heap
page read and write
2C33000
heap
page read and write
2CC1000
heap
page read and write
2C92000
heap
page read and write
2C9F000
heap
page read and write
2CAF000
heap
page read and write
2C2A000
heap
page read and write
2CC7000
heap
page read and write
2C4F000
heap
page read and write
2CC5000
heap
page read and write
2CA0000
heap
page read and write
2CB7000
heap
page read and write
2C2F000
heap
page read and write
4AD0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2CD2000
heap
page read and write
2CB3000
heap
page read and write
2C6E000
heap
page read and write
2C35000
heap
page read and write
2C94000
heap
page read and write
2C33000
heap
page read and write
49E1000
heap
page read and write
2CA0000
heap
page read and write
4A08000
heap
page read and write
2CB0000
heap
page read and write
2CBC000
heap
page read and write
2C7C000
heap
page read and write
2C35000
heap
page read and write
2CA0000
heap
page read and write
2CC7000
heap
page read and write
2C71000
heap
page read and write
2C1E000
heap
page read and write
2C40000
heap
page read and write
2C4F000
heap
page read and write
2CBF000
heap
page read and write
2C2B000
heap
page read and write
2C76000
heap
page read and write
49F8000
heap
page read and write
2C71000
heap
page read and write
2CB3000
heap
page read and write
2C6C000
heap
page read and write
2C52000
heap
page read and write
2CB8000
heap
page read and write
2CA4000
heap
page read and write
2C52000
heap
page read and write
2CBA000
heap
page read and write
2C6C000
heap
page read and write
2C9F000
heap
page read and write
2C92000
heap
page read and write
2C1C000
heap
page read and write
4960000
direct allocation
page read and write
2C96000
heap
page read and write
2C2C000
heap
page read and write
2C96000
heap
page read and write
2C35000
heap
page read and write
4AC0000
direct allocation
page read and write
2CA0000
heap
page read and write
2C68000
heap
page read and write
2CC7000
heap
page read and write
2CCA000
heap
page read and write
2C61000
heap
page read and write
2C71000
heap
page read and write
2CA5000
heap
page read and write
49E9000
heap
page read and write
2C7E000
heap
page read and write
2CCA000
heap
page read and write
2CCB000
heap
page read and write
2CC9000
heap
page read and write
2C3F000
heap
page read and write
4A0F000
heap
page read and write
2C4F000
heap
page read and write
2CC9000
heap
page read and write
2C89000
heap
page read and write
4960000
direct allocation
page read and write
2CD2000
heap
page read and write
2CC0000
heap
page read and write
2C2C000
heap
page read and write
2CCA000
heap
page read and write
2C60000
heap
page read and write
2C85000
heap
page read and write
2C27000
heap
page read and write
2CAE000
heap
page read and write
2CAE000
heap
page read and write
2C5F000
heap
page read and write
2CC9000
heap
page read and write
2C7A000
heap
page read and write
49F0000
heap
page read and write
4AD0000
direct allocation
page read and write
2CCD000
heap
page read and write
2CA9000
heap
page read and write
2C8E000
heap
page read and write
2C1C000
heap
page read and write
2CC2000
heap
page read and write
2C62000
heap
page read and write
2C29000
heap
page read and write
2C80000
heap
page read and write
2CCE000
heap
page read and write
2C9A000
heap
page read and write
2CCB000
heap
page read and write
2C33000
heap
page read and write
2C4F000
heap
page read and write
4A01000
heap
page read and write
2C86000
heap
page read and write
49F1000
heap
page read and write
49F1000
heap
page read and write
2CCA000
heap
page read and write
2C9D000
heap
page read and write
2C35000
heap
page read and write
8B0000
heap
page read and write
2C1C000
heap
page read and write
2C6A000
heap
page read and write
2CAE000
heap
page read and write
2CC9000
heap
page read and write
2A9B000
stack
page read and write
2C9F000
heap
page read and write
2C81000
heap
page read and write
2CD6000
heap
page read and write
2C9D000
heap
page read and write
2C4D000
heap
page read and write
2CBA000
heap
page read and write
2CD4000
heap
page read and write
2CC8000
heap
page read and write
2CC7000
heap
page read and write
4950000
direct allocation
page read and write
2C46000
heap
page read and write
2CCB000
heap
page read and write
2C7F000
heap
page read and write
2C27000
heap
page read and write
4A11000
heap
page read and write
2C2E000
heap
page read and write
2C82000
heap
page read and write
2C1C000
heap
page read and write
2C67000
heap
page read and write
2CB3000
heap
page read and write
2CD8000
heap
page read and write
2CBA000
heap
page read and write
2C58000
heap
page read and write
2CC5000
heap
page read and write
2C78000
heap
page read and write
2C65000
heap
page read and write
2C7E000
heap
page read and write
2CAE000
heap
page read and write
2CC9000
heap
page read and write
4A09000
heap
page read and write
2C4B000
heap
page read and write
2C5B000
heap
page read and write
2C40000
heap
page read and write
2CC4000
heap
page read and write
2C7B000
heap
page read and write
2C51000
heap
page read and write
2C89000
heap
page read and write
4960000
direct allocation
page read and write
2CBB000
heap
page read and write
2CBA000
heap
page read and write
2C7C000
heap
page read and write
2CB3000
heap
page read and write
2C7D000
heap
page read and write
2C77000
heap
page read and write
2C91000
heap
page read and write
2CCA000
heap
page read and write
2C8D000
heap
page read and write
2CDE000
heap
page read and write
4960000
direct allocation
page read and write
2C34000
heap
page read and write
2CC0000
heap
page read and write
2CA0000
heap
page read and write
2C77000
heap
page read and write
2C4B000
heap
page read and write
4960000
direct allocation
page read and write
2C32000
heap
page read and write
2C79000
heap
page read and write
4950000
direct allocation
page read and write
2CC7000
heap
page read and write
49E7000
heap
page read and write
2C71000
heap
page read and write
4960000
direct allocation
page read and write
2CA4000
heap
page read and write
2CA8000
heap
page read and write
4A10000
heap
page read and write
2CA9000
heap
page read and write
2C7C000
heap
page read and write
4960000
direct allocation
page read and write
2C6A000
heap
page read and write
2CC7000
heap
page read and write
4A08000
heap
page read and write
2C3D000
heap
page read and write
2CDB000
heap
page read and write
2C95000
heap
page read and write
4A10000
heap
page read and write
4960000
direct allocation
page read and write
2CA2000
heap
page read and write
2C6C000
heap
page read and write
2C3A000
heap
page read and write
2C9C000
heap
page read and write
4960000
direct allocation
page read and write
2CC9000
heap
page read and write
2C4B000
heap
page read and write
2CC5000
heap
page read and write
2CA9000
heap
page read and write
2CC7000
heap
page read and write
2C5E000
heap
page read and write
2C46000
heap
page read and write
2C92000
heap
page read and write
2C86000
heap
page read and write
4AD0000
direct allocation
page read and write
2C51000
heap
page read and write
4960000
direct allocation
page read and write
2C85000
heap
page read and write
2C52000
heap
page read and write
2C71000
heap
page read and write
49F3000
heap
page read and write
2CC0000
heap
page read and write
2C1E000
heap
page read and write
4AC0000
direct allocation
page read and write
2C2C000
heap
page read and write
2CA0000
heap
page read and write
2C9C000
heap
page read and write
2CAE000
heap
page read and write
2CB7000
heap
page read and write
2CD1000
heap
page read and write
2CC9000
heap
page read and write
2CCC000
heap
page read and write
2CDB000
heap
page read and write
2CC7000
heap
page read and write
2C94000
heap
page read and write
2C2F000
heap
page read and write
2C9F000
heap
page read and write
2C9E000
heap
page read and write
2CCE000
heap
page read and write
49F1000
heap
page read and write
2CA1000
heap
page read and write
4960000
direct allocation
page read and write
2CA9000
heap
page read and write
2C85000
heap
page read and write
2C64000
heap
page read and write
4A09000
heap
page read and write
2C96000
heap
page read and write
2CB2000
heap
page read and write
2C96000
heap
page read and write
2C94000
heap
page read and write
2C86000
heap
page read and write
4AC0000
direct allocation
page read and write
2C9F000
heap
page read and write
2C9D000
heap
page read and write
2C1A000
heap
page read and write
2C44000
heap
page read and write
2C2C000
heap
page read and write
2C64000
heap
page read and write
2C4F000
heap
page read and write
2C92000
heap
page read and write
2CBF000
heap
page read and write
2C68000
heap
page read and write
2C94000
heap
page read and write
2C81000
heap
page read and write
2C74000
heap
page read and write
4960000
direct allocation
page read and write
2C23000
heap
page read and write
6D161000
unkown
page execute read
2C37000
heap
page read and write
2C60000
heap
page read and write
2CB7000
heap
page read and write
2C30000
heap
page read and write
2C44000
heap
page read and write
2CCA000
heap
page read and write
2C40000
heap
page read and write
2CA2000
heap
page read and write
2C35000
heap
page read and write
2C5F000
heap
page read and write
2C4F000
heap
page read and write
49E7000
heap
page read and write
2C35000
heap
page read and write
2C35000
heap
page read and write
2C66000
heap
page read and write
3180000
heap
page read and write
2C53000
heap
page read and write
2CCB000
heap
page read and write
2C35000
heap
page read and write
2CB0000
heap
page read and write
4960000
direct allocation
page read and write
2C6C000
heap
page read and write
4960000
direct allocation
page read and write
2CC4000
heap
page read and write
4A11000
heap
page read and write
2C61000
heap
page read and write
2C89000
heap
page read and write
2C71000
heap
page read and write
2C7C000
heap
page read and write
2CBC000
heap
page read and write
2C92000
heap
page read and write
2C79000
heap
page read and write
2CBA000
heap
page read and write
4AC0000
direct allocation
page read and write
2C7E000
heap
page read and write
2C2D000
heap
page read and write
2CCE000
heap
page read and write
2C44000
heap
page read and write
2C97000
heap
page read and write
2C9D000
heap
page read and write
49FC000
heap
page read and write
2C3B000
heap
page read and write
2C7D000
heap
page read and write
6D21C000
unkown
page read and write
2C58000
heap
page read and write
2C47000
heap
page read and write
2C1C000
heap
page read and write
2C9F000
heap
page read and write
2CC5000
heap
page read and write
4A13000
heap
page read and write
2C36000
heap
page read and write
2C51000
heap
page read and write
2C76000
heap
page read and write
2C8B000
heap
page read and write
2CC9000
heap
page read and write
49E9000
heap
page read and write
2C30000
heap
page read and write
2CD8000
heap
page read and write
2C5C000
heap
page read and write
2C77000
heap
page read and write
2CC2000
heap
page read and write
2C37000
heap
page read and write
2CBA000
heap
page read and write
2CB0000
heap
page read and write
4950000
direct allocation
page read and write
2CC7000
heap
page read and write
2C38000
heap
page read and write
2C86000
heap
page read and write
2C6F000
heap
page read and write
2C8D000
heap
page read and write
2C52000
heap
page read and write
2C4D000
heap
page read and write
2C39000
heap
page read and write
2C9D000
heap
page read and write
2C85000
heap
page read and write
2CBA000
heap
page read and write
2C48000
heap
page read and write
2CC7000
heap
page read and write
6D1F8000
unkown
page readonly
2C65000
heap
page read and write
4950000
direct allocation
page read and write
2C22000
heap
page read and write
2C2C000
heap
page read and write
2C52000
heap
page read and write
2C35000
heap
page read and write
2C66000
heap
page read and write
2C94000
heap
page read and write
2C8A000
heap
page read and write
2C86000
heap
page read and write
49FA000
heap
page read and write
2C9F000
heap
page read and write
49F9000
heap
page read and write
2C60000
heap
page read and write
2CB1000
heap
page read and write
4960000
direct allocation
page read and write
2C65000
heap
page read and write
2C61000
heap
page read and write
2C95000
heap
page read and write
2C86000
heap
page read and write
2C22000
heap
page read and write
2C86000
heap
page read and write
2CB7000
heap
page read and write
2CC9000
heap
page read and write
2CDB000
heap
page read and write
2CC7000
heap
page read and write
2C75000
heap
page read and write
2CA1000
heap
page read and write
2C48000
heap
page read and write
2C97000
heap
page read and write
2C7C000
heap
page read and write
2CC3000
heap
page read and write
2C9C000
heap
page read and write
2CDB000
heap
page read and write
2CC7000
heap
page read and write
2C4C000
heap
page read and write
2C85000
heap
page read and write
2CBD000
heap
page read and write
49F7000
heap
page read and write
2C55000
heap
page read and write
2C94000
heap
page read and write
4960000
direct allocation
page read and write
2CCE000
heap
page read and write
4960000
direct allocation
page read and write
2C50000
heap
page read and write
2CDB000
heap
page read and write
2CA9000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C5E000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
2CDB000
heap
page read and write
4AC0000
direct allocation
page read and write
2C92000
heap
page read and write
2C97000
heap
page read and write
2CAF000
heap
page read and write
4AD0000
direct allocation
page read and write
2C90000
heap
page read and write
2C45000
heap
page read and write
2CCF000
heap
page read and write
2C30000
heap
page read and write
2C47000
heap
page read and write
2CC2000
heap
page read and write
2CCF000
heap
page read and write
2C7E000
heap
page read and write
2C71000
heap
page read and write
2C2A000
heap
page read and write
2CD2000
heap
page read and write
2C2E000
heap
page read and write
2CB3000
heap
page read and write
2CDE000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
2C8E000
heap
page read and write
4960000
direct allocation
page read and write
2C65000
heap
page read and write
2C8D000
heap
page read and write
2CDB000
heap
page read and write
2C86000
heap
page read and write
2C92000
heap
page read and write
2CDD000
heap
page read and write
2C94000
heap
page read and write
2C6F000
heap
page read and write
4AC0000
direct allocation
page read and write
2CA8000
heap
page read and write
2CC8000
heap
page read and write
2C81000
heap
page read and write
2C91000
heap
page read and write
2C9D000
heap
page read and write
2CC1000
heap
page read and write
2C31000
heap
page read and write
2C9D000
heap
page read and write
2CA8000
heap
page read and write
2C6A000
heap
page read and write
2C44000
heap
page read and write
2C55000
heap
page read and write
2C44000
heap
page read and write
2CBA000
heap
page read and write
2C8E000
heap
page read and write
4AD0000
direct allocation
page read and write
2C3E000
heap
page read and write
2C71000
heap
page read and write
2C5E000
heap
page read and write
31E0000
heap
page read and write
2CD4000
heap
page read and write
2CB3000
heap
page read and write
2CA4000
heap
page read and write
2CB3000
heap
page read and write
4AC0000
direct allocation
page read and write
2CA7000
heap
page read and write
2C8E000
heap
page read and write
2C9A000
heap
page read and write
2CB8000
heap
page read and write
2CCA000
heap
page read and write
49E9000
heap
page read and write
2CA7000
heap
page read and write
2C95000
heap
page read and write
2C8B000
heap
page read and write
49C0000
direct allocation
page read and write
2CBF000
heap
page read and write
49F1000
heap
page read and write
2C29000
heap
page read and write
4AD0000
direct allocation
page read and write
2C4D000
heap
page read and write
2C73000
heap
page read and write
2CBE000
heap
page read and write
2C85000
heap
page read and write
2C92000
heap
page read and write
2CDB000
heap
page read and write
2C7D000
heap
page read and write
2C34000
heap
page read and write
2C66000
heap
page read and write
2CCA000
heap
page read and write
2C94000
heap
page read and write
2CC7000
heap
page read and write
2C2C000
heap
page read and write
2CA9000
heap
page read and write
2C3B000
heap
page read and write
49C4000
heap
page read and write
2CCB000
heap
page read and write
2C65000
heap
page read and write
2C6C000
heap
page read and write
2CC9000
heap
page read and write
2C60000
heap
page read and write
2C62000
heap
page read and write
4960000
direct allocation
page read and write
2C7C000
heap
page read and write
2C55000
heap
page read and write
2CD2000
heap
page read and write
2C7C000
heap
page read and write
2C8E000
heap
page read and write
2CC8000
heap
page read and write
2CA5000
heap
page read and write
2CAC000
heap
page read and write
2CC7000
heap
page read and write
2CBA000
heap
page read and write
4AC0000
direct allocation
page read and write
2C86000
heap
page read and write
2CCB000
heap
page read and write
2CC6000
heap
page read and write
3070000
heap
page read and write
2C4C000
heap
page read and write
2C51000
heap
page read and write
2C32000
heap
page read and write
2C86000
heap
page read and write
2C31000
heap
page read and write
2C9A000
heap
page read and write
2CB1000
heap
page read and write
2CDB000
heap
page read and write
2C7D000
heap
page read and write
2CB7000
heap
page read and write
2C5C000
heap
page read and write
2C72000
heap
page read and write
2CC7000
heap
page read and write
4AD0000
direct allocation
page read and write
2CCC000
heap
page read and write
2C2C000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2C7E000
heap
page read and write
2CC5000
heap
page read and write
2CB2000
heap
page read and write
4960000
direct allocation
page read and write
2C35000
heap
page read and write
2C4F000
heap
page read and write
49FB000
heap
page read and write
2C90000
heap
page read and write
2C61000
heap
page read and write
2AC0000
direct allocation
page read and write
49FD000
heap
page read and write
2CC2000
heap
page read and write
2C44000
heap
page read and write
2C91000
heap
page read and write
2C35000
heap
page read and write
2CC9000
heap
page read and write
2C85000
heap
page read and write
2C8C000
heap
page read and write
2C38000
heap
page read and write
2C45000
heap
page read and write
4960000
direct allocation
page read and write
2C4F000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
2CBE000
heap
page read and write
2CCB000
heap
page read and write
2C4F000
heap
page read and write
2C83000
heap
page read and write
2CAF000
heap
page read and write
2C7C000
heap
page read and write
4A05000
heap
page read and write
2CBE000
heap
page read and write
2CBF000
heap
page read and write
2C86000
heap
page read and write
2C4F000
heap
page read and write
2CA6000
heap
page read and write
2C9F000
heap
page read and write
2C87000
heap
page read and write
2C8C000
heap
page read and write
2CB0000
heap
page read and write
2C52000
heap
page read and write
2CCE000
heap
page read and write
2CD6000
heap
page read and write
2CDB000
heap
page read and write
2C4B000
heap
page read and write
2C34000
heap
page read and write
2C99000
heap
page read and write
2C45000
heap
page read and write
2C85000
heap
page read and write
2CBF000
heap
page read and write
2C89000
heap
page read and write
2C28000
heap
page read and write
2C8E000
heap
page read and write
2C23000
heap
page read and write
2C7C000
heap
page read and write
4960000
direct allocation
page read and write
2C35000
heap
page read and write
4A12000
heap
page read and write
4960000
direct allocation
page read and write
2CA7000
heap
page read and write
2CB5000
heap
page read and write
2F05000
heap
page read and write
2C65000
heap
page read and write
2CBA000
heap
page read and write
4A03000
heap
page read and write
2C62000
heap
page read and write
2C65000
heap
page read and write
4A0F000
heap
page read and write
2CCF000
heap
page read and write
2C6B000
heap
page read and write
2C4F000
heap
page read and write
2C90000
heap
page read and write
2C9F000
heap
page read and write
2C97000
heap
page read and write
4960000
direct allocation
page read and write
2CDB000
heap
page read and write
2C37000
heap
page read and write
2C95000
heap
page read and write
49C0000
direct allocation
page read and write
2C65000
heap
page read and write
2C91000
heap
page read and write
2C35000
heap
page read and write
2C26000
heap
page read and write
2C60000
heap
page read and write
2C7C000
heap
page read and write
2AC0000
direct allocation
page read and write
2C5E000
heap
page read and write
49F6000
heap
page read and write
2CB8000
heap
page read and write
2C94000
heap
page read and write
2C86000
heap
page read and write
2C86000
heap
page read and write
2CA2000
heap
page read and write
2C97000
heap
page read and write
2C2A000
heap
page read and write
4960000
direct allocation
page read and write
2C58000
heap
page read and write
2CD2000
heap
page read and write
2C9F000
heap
page read and write
2CCB000
heap
page read and write
2C73000
heap
page read and write
2C7D000
heap
page read and write
2CD4000
heap
page read and write
2CC2000
heap
page read and write
2C90000
heap
page read and write
2C9B000
heap
page read and write
4AD0000
direct allocation
page read and write
2CBC000
heap
page read and write
2CA0000
heap
page read and write
2C8D000
heap
page read and write
2C74000
heap
page read and write
2C33000
heap
page read and write
2C8A000
heap
page read and write
2C5E000
heap
page read and write
2C6F000
heap
page read and write
2C86000
heap
page read and write
2C38000
heap
page read and write
2C42000
heap
page read and write
2CDB000
heap
page read and write
2C9B000
heap
page read and write
2C52000
heap
page read and write
2C5E000
heap
page read and write
2C94000
heap
page read and write
2CA0000
heap
page read and write
2C6C000
heap
page read and write
6D218000
unkown
page write copy
2C4B000
heap
page read and write
2C82000
heap
page read and write
2CCC000
heap
page read and write
2CD4000
heap
page read and write
2C35000
heap
page read and write
2CAE000
heap
page read and write
2CA0000
heap
page read and write
2C62000
heap
page read and write
2C2E000
heap
page read and write
2C4F000
heap
page read and write
2CCA000
heap
page read and write
2C35000
heap
page read and write
2CCB000
heap
page read and write
2CB7000
heap
page read and write
2C79000
heap
page read and write
2C96000
heap
page read and write
2CC2000
heap
page read and write
2CC1000
heap
page read and write
2C92000
heap
page read and write
2C44000
heap
page read and write
2C52000
heap
page read and write
2C6B000
heap
page read and write
2C49000
heap
page read and write
2CC9000
heap
page read and write
2C65000
heap
page read and write
4A1D000
heap
page read and write
2CC7000
heap
page read and write
2CCF000
heap
page read and write
2C96000
heap
page read and write
2C97000
heap
page read and write
4960000
direct allocation
page read and write
2C97000
heap
page read and write
2CBD000
heap
page read and write
4AD0000
direct allocation
page read and write
2C1A000
heap
page read and write
2C72000
heap
page read and write
49F1000
heap
page read and write
2C7C000
heap
page read and write
2C99000
heap
page read and write
2CA7000
heap
page read and write
2C48000
heap
page read and write
2C4B000
heap
page read and write
2C92000
heap
page read and write
2CC4000
heap
page read and write
2CBF000
heap
page read and write
2C86000
heap
page read and write
2C5E000
heap
page read and write
2C92000
heap
page read and write
4A28000
heap
page read and write
2CBD000
heap
page read and write
2CA1000
heap
page read and write
2CCE000
heap
page read and write
2CAE000
heap
page read and write
2C5E000
heap
page read and write
2C32000
heap
page read and write
2C7E000
heap
page read and write
2CC0000
heap
page read and write
2C6C000
heap
page read and write
2CD2000
heap
page read and write
2C82000
heap
page read and write
2C7F000
heap
page read and write
2CA4000
heap
page read and write
2C82000
heap
page read and write
2C8C000
heap
page read and write
2C5C000
heap
page read and write
2C7C000
heap
page read and write
2CB2000
heap
page read and write
2C9C000
heap
page read and write
4960000
direct allocation
page read and write
2C71000
heap
page read and write
2CA1000
heap
page read and write
2C96000
heap
page read and write
2C97000
heap
page read and write
2C27000
heap
page read and write
2C94000
heap
page read and write
2C82000
heap
page read and write
2C86000
heap
page read and write
49FF000
heap
page read and write
2C48000
heap
page read and write
2CC7000
heap
page read and write
2C9A000
heap
page read and write
2C73000
heap
page read and write
2CD2000
heap
page read and write
2C90000
heap
page read and write
2CA0000
heap
page read and write
2CA8000
heap
page read and write
2CC7000
heap
page read and write
2C34000
heap
page read and write
2C58000
heap
page read and write
2C2E000
heap
page read and write
2CAF000
heap
page read and write
2CC4000
heap
page read and write
2C44000
heap
page read and write
2C72000
heap
page read and write
2C36000
heap
page read and write
2C8D000
heap
page read and write
2C89000
heap
page read and write
4AC0000
direct allocation
page read and write
4A08000
heap
page read and write
2CBF000
heap
page read and write
2C94000
heap
page read and write
49F1000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2CD2000
heap
page read and write
2C95000
heap
page read and write
2C6F000
heap
page read and write
2C58000
heap
page read and write
710000
heap
page read and write
2CA3000
heap
page read and write
2C22000
heap
page read and write
2C66000
heap
page read and write
2CBF000
heap
page read and write
4A09000
heap
page read and write
2C1E000
heap
page read and write
2C94000
heap
page read and write
2C45000
heap
page read and write
2C22000
heap
page read and write
2C38000
heap
page read and write
2CA8000
heap
page read and write
2C6E000
heap
page read and write
2C72000
heap
page read and write
2CB2000
heap
page read and write
4960000
direct allocation
page read and write
2C7C000
heap
page read and write
49FF000
heap
page read and write
2C8B000
heap
page read and write
2C48000
heap
page read and write
4AC0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2C60000
heap
page read and write
2C98000
heap
page read and write
2CC3000
heap
page read and write
2CA8000
heap
page read and write
4AC0000
direct allocation
page read and write
2C5F000
heap
page read and write
2C86000
heap
page read and write
2CB8000
heap
page read and write
2C82000
heap
page read and write
2C6E000
heap
page read and write
4960000
direct allocation
page read and write
2C95000
heap
page read and write
2CDB000
heap
page read and write
2C6F000
heap
page read and write
2CBA000
heap
page read and write
2CD2000
heap
page read and write
4A10000
heap
page read and write
2C46000
heap
page read and write
2C5E000
heap
page read and write
2C71000
heap
page read and write
2CA4000
heap
page read and write
2C64000
heap
page read and write
2CC6000
heap
page read and write
2CA3000
heap
page read and write
2CB6000
heap
page read and write
2CB3000
heap
page read and write
2CDD000
heap
page read and write
2CCF000
heap
page read and write
2CDB000
heap
page read and write
4A03000
heap
page read and write
2C96000
heap
page read and write
2C6C000
heap
page read and write
2CA6000
heap
page read and write
2C62000
heap
page read and write
2CA7000
heap
page read and write
2CD7000
heap
page read and write
2C2A000
heap
page read and write
4960000
direct allocation
page read and write
4A17000
heap
page read and write
2C96000
heap
page read and write
2C58000
heap
page read and write
2C3B000
heap
page read and write
2C9D000
heap
page read and write
2C9F000
heap
page read and write
2C53000
heap
page read and write
2CC0000
heap
page read and write
2C52000
heap
page read and write
2C7D000
heap
page read and write
2C61000
heap
page read and write
2CB0000
heap
page read and write
2C6E000
heap
page read and write
2C60000
heap
page read and write
4960000
direct allocation
page read and write
2C91000
heap
page read and write
2C7B000
heap
page read and write
2C4F000
heap
page read and write
2CA0000
heap
page read and write
2C86000
heap
page read and write
2CBE000
heap
page read and write
2CBA000
heap
page read and write
2CC8000
heap
page read and write
49F1000
heap
page read and write
2CCC000
heap
page read and write
2C92000
heap
page read and write
2CA9000
heap
page read and write
2C9B000
heap
page read and write
4950000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
4A09000
heap
page read and write
2CAC000
heap
page read and write
2C77000
heap
page read and write
2CC4000
heap
page read and write
2C92000
heap
page read and write
2C95000
heap
page read and write
2CCF000
heap
page read and write
2C97000
heap
page read and write
2C92000
heap
page read and write
4960000
direct allocation
page read and write
2C9B000
heap
page read and write
4A0F000
heap
page read and write
2CD2000
heap
page read and write
2C7C000
heap
page read and write
2C62000
heap
page read and write
2C37000
heap
page read and write
4960000
direct allocation
page read and write
2C2A000
heap
page read and write
2CD2000
heap
page read and write
2CA1000
heap
page read and write
2CC5000
heap
page read and write
2C44000
heap
page read and write
2CA8000
heap
page read and write
2C45000
heap
page read and write
2CC2000
heap
page read and write
4AC0000
direct allocation
page read and write
2C95000
heap
page read and write
2C63000
heap
page read and write
2C7E000
heap
page read and write
2CCE000
heap
page read and write
2C40000
heap
page read and write
2CA9000
heap
page read and write
2C37000
heap
page read and write
4960000
direct allocation
page read and write
2C6E000
heap
page read and write
2C1C000
heap
page read and write
2C71000
heap
page read and write
2CBF000
heap
page read and write
49FD000
heap
page read and write
2C96000
heap
page read and write
4960000
direct allocation
page read and write
2C51000
heap
page read and write
4950000
direct allocation
page read and write
4960000
direct allocation
page read and write
2CCB000
heap
page read and write
2C9C000
heap
page read and write
2CBF000
heap
page read and write
2CCF000
heap
page read and write
2C2F000
heap
page read and write
2CDB000
heap
page read and write
2C36000
heap
page read and write
2C86000
heap
page read and write
2C9A000
heap
page read and write
2C44000
heap
page read and write
2C9A000
heap
page read and write
2C91000
heap
page read and write
4A10000
heap
page read and write
2C6E000
heap
page read and write
2C9C000
heap
page read and write
2CC7000
heap
page read and write
49C0000
direct allocation
page read and write
2C62000
heap
page read and write
4960000
direct allocation
page read and write
2C2C000
heap
page read and write
4960000
direct allocation
page read and write
2C7E000
heap
page read and write
2C47000
heap
page read and write
2C9B000
heap
page read and write
2C38000
heap
page read and write
2C96000
heap
page read and write
2C4F000
heap
page read and write
2CAE000
heap
page read and write
2CD2000
heap
page read and write
2C52000
heap
page read and write
2C8E000
heap
page read and write
4960000
direct allocation
page read and write
2CA0000
heap
page read and write
2C4F000
heap
page read and write
2CC7000
heap
page read and write
2C86000
heap
page read and write
2C98000
heap
page read and write
2C9C000
heap
page read and write
2C4B000
heap
page read and write
4AC0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2C86000
heap
page read and write
2C44000
heap
page read and write
2CCA000
heap
page read and write
2C22000
heap
page read and write
2C77000
heap
page read and write
2C9E000
heap
page read and write
2C85000
heap
page read and write
2C9A000
heap
page read and write
2C5E000
heap
page read and write
4960000
direct allocation
page read and write
4A14000
heap
page read and write
2CBA000
heap
page read and write
2C52000
heap
page read and write
2C65000
heap
page read and write
2C94000
heap
page read and write
2CC7000
heap
page read and write
4960000
direct allocation
page read and write
2C5E000
heap
page read and write
2CA1000
heap
page read and write
2C1A000
heap
page read and write
2C3B000
heap
page read and write
2C9B000
heap
page read and write
2C1C000
heap
page read and write
2CDB000
heap
page read and write
2C86000
heap
page read and write
2CCA000
heap
page read and write
2CA8000
heap
page read and write
2C6B000
heap
page read and write
2CB6000
heap
page read and write
2CC7000
heap
page read and write
2C90000
heap
page read and write
2C65000
heap
page read and write
2C7F000
heap
page read and write
2C73000
heap
page read and write
2C71000
heap
page read and write
2CD7000
heap
page read and write
2C85000
heap
page read and write
2CB7000
heap
page read and write
2C96000
heap
page read and write
49FA000
heap
page read and write
2CB0000
heap
page read and write
2C2B000
heap
page read and write
2C4B000
heap
page read and write
2C7C000
heap
page read and write
2C6E000
heap
page read and write
2CC7000
heap
page read and write
6D160000
unkown
page readonly
2CAC000
heap
page read and write
2CB2000
heap
page read and write
2CC4000
heap
page read and write
2CD7000
heap
page read and write
2C96000
heap
page read and write
2C9F000
heap
page read and write
4960000
direct allocation
page read and write
2C9C000
heap
page read and write
2CC1000
heap
page read and write
2CA6000
heap
page read and write
2CC3000
heap
page read and write
2C90000
heap
page read and write
2C7C000
heap
page read and write
2C4F000
heap
page read and write
2C62000
heap
page read and write
2CCE000
heap
page read and write
2C53000
heap
page read and write
2C5F000
heap
page read and write
2C72000
heap
page read and write
2C38000
heap
page read and write
4A05000
heap
page read and write
2CC5000
heap
page read and write
49EC000
heap
page read and write
3540000
heap
page read and write
2C35000
heap
page read and write
2C96000
heap
page read and write
2CCE000
heap
page read and write
2C85000
heap
page read and write
2CB1000
heap
page read and write
2C52000
heap
page read and write
2C7C000
heap
page read and write
2CC0000
heap
page read and write
2C3D000
heap
page read and write
2C65000
heap
page read and write
2C74000
heap
page read and write
2CA1000
heap
page read and write
2CD2000
heap
page read and write
49F2000
heap
page read and write
2C4D000
heap
page read and write
2C71000
heap
page read and write
2CBD000
heap
page read and write
2C86000
heap
page read and write
2ADC000
stack
page read and write
2C6C000
heap
page read and write
4AD0000
direct allocation
page read and write
2CDB000
heap
page read and write
2C5F000
heap
page read and write
2CC7000
heap
page read and write
2C6A000
heap
page read and write
2C97000
heap
page read and write
2C90000
heap
page read and write
2B40000
heap
page read and write
2C94000
heap
page read and write
2CC9000
heap
page read and write
4AC0000
direct allocation
page read and write
2C85000
heap
page read and write
2C9E000
heap
page read and write
4A09000
heap
page read and write
2CDB000
heap
page read and write
4AC0000
direct allocation
page read and write
2C89000
heap
page read and write
2C44000
heap
page read and write
2CDB000
heap
page read and write
2CCC000
heap
page read and write
2CC7000
heap
page read and write
2CC3000
heap
page read and write
2CA3000
heap
page read and write
4AC0000
direct allocation
page read and write
2C68000
heap
page read and write
49F7000
heap
page read and write
2CCC000
heap
page read and write
49C0000
direct allocation
page read and write
2CDB000
heap
page read and write
4AC0000
direct allocation
page read and write
2C3A000
heap
page read and write
5030000
heap
page read and write
2CCB000
heap
page read and write
2C9F000
heap
page read and write
2CC4000
heap
page read and write
2CC7000
heap
page read and write
2C1C000
heap
page read and write
2C3E000
heap
page read and write
2CBB000
heap
page read and write
2C93000
heap
page read and write
2CBB000
heap
page read and write
49F9000
heap
page read and write
2C30000
heap
page read and write
2C22000
heap
page read and write
4AC0000
direct allocation
page read and write
2CCA000
heap
page read and write
2CDB000
heap
page read and write
2C98000
heap
page read and write
2C95000
heap
page read and write
2CC7000
heap
page read and write
2C8E000
heap
page read and write
2CCF000
heap
page read and write
2CD2000
heap
page read and write
2C7E000
heap
page read and write
2C73000
heap
page read and write
2CD2000
heap
page read and write
2CC0000
heap
page read and write
4960000
direct allocation
page read and write
2CCA000
heap
page read and write
2CBB000
heap
page read and write
2C35000
heap
page read and write
2C90000
heap
page read and write
2CA9000
heap
page read and write
2C55000
heap
page read and write
2CBE000
heap
page read and write
2C29000
heap
page read and write
2C7F000
heap
page read and write
2C51000
heap
page read and write
2CCE000
heap
page read and write
2CCE000
heap
page read and write
2C85000
heap
page read and write
2C81000
heap
page read and write
2C9B000
heap
page read and write
2CD8000
heap
page read and write
2C96000
heap
page read and write
2C2A000
heap
page read and write
4960000
direct allocation
page read and write
2C71000
heap
page read and write
2C92000
heap
page read and write
2C95000
heap
page read and write
2C19000
heap
page read and write
2C7C000
heap
page read and write
4950000
direct allocation
page read and write
2C79000
heap
page read and write
2C7C000
heap
page read and write
2C96000
heap
page read and write
2CC9000
heap
page read and write
2CC7000
heap
page read and write
2C3B000
heap
page read and write
2C9C000
heap
page read and write
2CD2000
heap
page read and write
2C96000
heap
page read and write
4960000
direct allocation
page read and write
2C85000
heap
page read and write
2C37000
heap
page read and write
2C9D000
heap
page read and write
4A0C000
heap
page read and write
49F6000
heap
page read and write
2CA6000
heap
page read and write
2CD2000
heap
page read and write
2C94000
heap
page read and write
49F0000
heap
page read and write
2C73000
heap
page read and write
2CA0000
heap
page read and write
2CD4000
heap
page read and write
2C7C000
heap
page read and write
2CC2000
heap
page read and write
2C36000
heap
page read and write
2C79000
heap
page read and write
2C9D000
heap
page read and write
2CA9000
heap
page read and write
2CCB000
heap
page read and write
2CBF000
heap
page read and write
4AC0000
direct allocation
page read and write
2CD4000
heap
page read and write
2C65000
heap
page read and write
4960000
direct allocation
page read and write
2C85000
heap
page read and write
2C53000
heap
page read and write
2C7C000
heap
page read and write
2C5E000
heap
page read and write
2CB6000
heap
page read and write
2C2E000
heap
page read and write
2C7C000
heap
page read and write
2C48000
heap
page read and write
2C47000
heap
page read and write
2CB8000
heap
page read and write
4950000
direct allocation
page read and write
2CBF000
heap
page read and write
2C37000
heap
page read and write
2CDB000
heap
page read and write
2C1C000
heap
page read and write
2CB7000
heap
page read and write
2C7C000
heap
page read and write
4AC0000
direct allocation
page read and write
2CDB000
heap
page read and write
2C58000
heap
page read and write
49C0000
direct allocation
page read and write
2C85000
heap
page read and write
4AC0000
direct allocation
page read and write
2C3E000
heap
page read and write
2C4F000
heap
page read and write
2CC9000
heap
page read and write
2CBF000
heap
page read and write
2C90000
heap
page read and write
2C86000
heap
page read and write
2C4B000
heap
page read and write
2C2E000
heap
page read and write
2CA7000
heap
page read and write
2CB0000
heap
page read and write
2C30000
heap
page read and write
2CDB000
heap
page read and write
2C1E000
heap
page read and write
2CA5000
heap
page read and write
2C36000
heap
page read and write
2CA8000
heap
page read and write
2C9A000
heap
page read and write
2C81000
heap
page read and write
2CC7000
heap
page read and write
2C47000
heap
page read and write
2C7D000
heap
page read and write
2C44000
heap
page read and write
2C9F000
heap
page read and write
2CC0000
heap
page read and write
2C69000
heap
page read and write
2C9F000
heap
page read and write
2CBD000
heap
page read and write
2CA9000
heap
page read and write
2CC9000
heap
page read and write
49E9000
heap
page read and write
2C8B000
heap
page read and write
2C44000
heap
page read and write
2CC9000
heap
page read and write
4AC0000
direct allocation
page read and write
2CA4000
heap
page read and write
2C63000
heap
page read and write
2C38000
heap
page read and write
2CBC000
heap
page read and write
2C1C000
heap
page read and write
2C2E000
heap
page read and write
2C23000
heap
page read and write
4960000
direct allocation
page read and write
2C30000
heap
page read and write
4960000
direct allocation
page read and write
2CA7000
heap
page read and write
2CDB000
heap
page read and write
2CD2000
heap
page read and write
2CA7000
heap
page read and write
2C71000
heap
page read and write
2CC9000
heap
page read and write
4960000
direct allocation
page read and write
2CD3000
heap
page read and write
2CA9000
heap
page read and write
2C49000
heap
page read and write
2C85000
heap
page read and write
2C94000
heap
page read and write
2C52000
heap
page read and write
2C92000
heap
page read and write
2C44000
heap
page read and write
2CA0000
heap
page read and write
2CA4000
heap
page read and write
49F1000
heap
page read and write
2CC7000
heap
page read and write
2CC3000
heap
page read and write
4A08000
heap
page read and write
2CDC000
heap
page read and write
2C65000
heap
page read and write
2C2D000
heap
page read and write
2C85000
heap
page read and write
2CCE000
heap
page read and write
2C3B000
heap
page read and write
2C3F000
heap
page read and write
2C9F000
heap
page read and write
2CDB000
heap
page read and write
2CC8000
heap
page read and write
2C94000
heap
page read and write
2CBE000
heap
page read and write
2CBE000
heap
page read and write
49F8000
heap
page read and write
2C31000
heap
page read and write
2C26000
heap
page read and write
2CA8000
heap
page read and write
2C7C000
heap
page read and write
2CC9000
heap
page read and write
2C92000
heap
page read and write
4A19000
heap
page read and write
2C38000
heap
page read and write
4960000
direct allocation
page read and write
4960000
direct allocation
page read and write
49FC000
heap
page read and write
2CDB000
heap
page read and write
2C7C000
heap
page read and write
2C92000
heap
page read and write
2CC7000
heap
page read and write
2CB0000
heap
page read and write
2B50000
heap
page read and write
2CBD000
heap
page read and write
2CA0000
heap
page read and write
2CB3000
heap
page read and write
2C6B000
heap
page read and write
2CBF000
heap
page read and write
2C9C000
heap
page read and write
2C85000
heap
page read and write
2CC4000
heap
page read and write
4960000
direct allocation
page read and write
2C7C000
heap
page read and write
9EE000
stack
page read and write
2C6E000
heap
page read and write
2C76000
heap
page read and write
2CA0000
heap
page read and write
2C92000
heap
page read and write
2C4C000
heap
page read and write
4960000
direct allocation
page read and write
2C96000
heap
page read and write
2CD3000
heap
page read and write
2CC8000
heap
page read and write
2CAC000
heap
page read and write
2CA5000
heap
page read and write
2C92000
heap
page read and write
2C94000
heap
page read and write
2C83000
heap
page read and write
2C44000
heap
page read and write
2CAA000
heap
page read and write
2C9A000
heap
page read and write
2C97000
heap
page read and write
2CB3000
heap
page read and write
2C2E000
heap
page read and write
2C85000
heap
page read and write
2C25000
heap
page read and write
2C8E000
heap
page read and write
2C4B000
heap
page read and write
2CDB000
heap
page read and write
4AC0000
direct allocation
page read and write
2CCA000
heap
page read and write
4AD0000
direct allocation
page read and write
2CA0000
heap
page read and write
2C52000
heap
page read and write
2C9F000
heap
page read and write
2C44000
heap
page read and write
4960000
direct allocation
page read and write
2CCA000
heap
page read and write
2CA7000
heap
page read and write
2CB8000
heap
page read and write
2C90000
heap
page read and write
2CC6000
heap
page read and write
4AC0000
direct allocation
page read and write
2C4B000
heap
page read and write
4A08000
heap
page read and write
2C30000
heap
page read and write
4960000
direct allocation
page read and write
2C35000
heap
page read and write
2C5A000
heap
page read and write
2F9A000
heap
page read and write
2C19000
heap
page read and write
2CDB000
heap
page read and write
4960000
direct allocation
page read and write
2CA4000
heap
page read and write
4AC0000
direct allocation
page read and write
2C3B000
heap
page read and write
2C89000
heap
page read and write
2C4B000
heap
page read and write
2C72000
heap
page read and write
2C4C000
heap
page read and write
2C35000
heap
page read and write
2C96000
heap
page read and write
2C53000
heap
page read and write
2C8D000
heap
page read and write
2C9A000
heap
page read and write
2C48000
heap
page read and write
2CC2000
heap
page read and write
2CA3000
heap
page read and write
4AC0000
direct allocation
page read and write
2C92000
heap
page read and write
4A1E000
heap
page read and write
2C8D000
heap
page read and write
2C2A000
heap
page read and write
2CBC000
heap
page read and write
2C51000
heap
page read and write
2C6E000
heap
page read and write
2C52000
heap
page read and write
2C30000
heap
page read and write
2C86000
heap
page read and write
2C85000
heap
page read and write
2CC2000
heap
page read and write
2C21000
heap
page read and write
2CCA000
heap
page read and write
2F4F000
stack
page read and write
2CC7000
heap
page read and write
2CAE000
heap
page read and write
2C72000
heap
page read and write
2C85000
heap
page read and write
2CDB000
heap
page read and write
49FC000
heap
page read and write
2C85000
heap
page read and write
4AE0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2C7E000
heap
page read and write
4AD0000
direct allocation
page read and write
2C65000
heap
page read and write
2CB7000
heap
page read and write
2CA7000
heap
page read and write
49E9000
heap
page read and write
2CC9000
heap
page read and write
2C6E000
heap
page read and write
4960000
direct allocation
page read and write
2CA7000
heap
page read and write
4960000
direct allocation
page read and write
2C33000
heap
page read and write
2C7C000
heap
page read and write
2CBB000
heap
page read and write
2C4B000
heap
page read and write
2CDB000
heap
page read and write
2C1C000
heap
page read and write
2C4B000
heap
page read and write
4960000
direct allocation
page read and write
2C7C000
heap
page read and write
2CD7000
heap
page read and write
2C85000
heap
page read and write
2C9B000
heap
page read and write
2C8B000
heap
page read and write
2CAF000
heap
page read and write
2C7C000
heap
page read and write
4AC0000
direct allocation
page read and write
2CA0000
heap
page read and write
2C55000
heap
page read and write
2CCF000
heap
page read and write
2CBB000
heap
page read and write
2C86000
heap
page read and write
6D224000
unkown
page readonly
49F7000
heap
page read and write
4960000
direct allocation
page read and write
2C9F000
heap
page read and write
2CCD000
heap
page read and write
2C9B000
heap
page read and write
2CBC000
heap
page read and write
4A14000
heap
page read and write
2C31000
heap
page read and write
2C9C000
heap
page read and write
4A08000
heap
page read and write
2C7E000
heap
page read and write
2C8C000
heap
page read and write
2CA6000
heap
page read and write
2CA1000
heap
page read and write
2C22000
heap
page read and write
2CCE000
heap
page read and write
2CDB000
heap
page read and write
2C81000
heap
page read and write
2CC6000
heap
page read and write
2C92000
heap
page read and write
2CC3000
heap
page read and write
2C37000
heap
page read and write
2C2C000
heap
page read and write
4960000
direct allocation
page read and write
2C5C000
heap
page read and write
2CA8000
heap
page read and write
2C9D000
heap
page read and write
4960000
direct allocation
page read and write
2C7B000
heap
page read and write
2CA5000
heap
page read and write
2C98000
heap
page read and write
2C9F000
heap
page read and write
2CA9000
heap
page read and write
2CCA000
heap
page read and write
6D221000
unkown
page read and write
2C39000
heap
page read and write
2C89000
heap
page read and write
2C5F000
heap
page read and write
4A08000
heap
page read and write
2C86000
heap
page read and write
2C1A000
heap
page read and write
2C90000
heap
page read and write
2C8D000
heap
page read and write
2CC5000
heap
page read and write
2C8B000
heap
page read and write
2C45000
heap
page read and write
2C2C000
heap
page read and write
2C1C000
heap
page read and write
2C86000
heap
page read and write
2C65000
heap
page read and write
2CA0000
heap
page read and write
2C32000
heap
page read and write
2CB7000
heap
page read and write
2C62000
heap
page read and write
2CCC000
heap
page read and write
2C60000
heap
page read and write
2C99000
heap
page read and write
2C22000
heap
page read and write
2C86000
heap
page read and write
2C45000
heap
page read and write
2CA0000
heap
page read and write
2C94000
heap
page read and write
2C35000
heap
page read and write
2CA7000
heap
page read and write
2C85000
heap
page read and write
2C9F000
heap
page read and write
2C8A000
heap
page read and write
2C50000
heap
page read and write
4960000
direct allocation
page read and write
2C4D000
heap
page read and write
2C6E000
heap
page read and write
2C65000
heap
page read and write
2CC4000
heap
page read and write
2CDB000
heap
page read and write
2C6C000
heap
page read and write
2C2A000
heap
page read and write
2C2A000
heap
page read and write
2C65000
heap
page read and write
A8F000
heap
page read and write
3130000
heap
page read and write
49FA000
heap
page read and write
2C8C000
heap
page read and write
2C77000
heap
page read and write
2C9D000
heap
page read and write
4AD0000
direct allocation
page read and write
2C58000
heap
page read and write
2C46000
heap
page read and write
2CA7000
heap
page read and write
49E8000
heap
page read and write
2C26000
heap
page read and write
2CC1000
heap
page read and write
2C36000
heap
page read and write
2C6E000
heap
page read and write
4AC0000
direct allocation
page read and write
2C7C000
heap
page read and write
2C93000
heap
page read and write
2CB0000
heap
page read and write
2C96000
heap
page read and write
2C47000
heap
page read and write
2CCA000
heap
page read and write
4960000
direct allocation
page read and write
2C2E000
heap
page read and write
2C7A000
heap
page read and write
2C4D000
heap
page read and write
2CD2000
heap
page read and write
2CA1000
heap
page read and write
2C45000
heap
page read and write
4960000
direct allocation
page read and write
2CCC000
heap
page read and write
2C9B000
heap
page read and write
4950000
direct allocation
page read and write
2C85000
heap
page read and write
2C39000
heap
page read and write
2C3D000
heap
page read and write
2C9E000
heap
page read and write
2C89000
heap
page read and write
4A03000
heap
page read and write
2C90000
heap
page read and write
2CDE000
heap
page read and write
49E1000
heap
page read and write
2CC7000
heap
page read and write
2C9F000
heap
page read and write
2C22000
heap
page read and write
2CC4000
heap
page read and write
2C9B000
heap
page read and write
2C7C000
heap
page read and write
2C82000
heap
page read and write
2C2E000
heap
page read and write
2C92000
heap
page read and write
49C0000
direct allocation
page read and write
2C8E000
heap
page read and write
2CDB000
heap
page read and write
2C92000
heap
page read and write
2CCE000
heap
page read and write
4AC0000
direct allocation
page read and write
2C7C000
heap
page read and write
2C9A000
heap
page read and write
2CD2000
heap
page read and write
2CCC000
heap
page read and write
2C7C000
heap
page read and write
2C9F000
heap
page read and write
2CA7000
heap
page read and write
4950000
direct allocation
page read and write
2C86000
heap
page read and write
2C87000
heap
page read and write
4AE0000
direct allocation
page read and write
2CC0000
heap
page read and write
2C85000
heap
page read and write
4960000
direct allocation
page read and write
2C89000
heap
page read and write
2CB0000
heap
page read and write
2C9A000
heap
page read and write
2C1C000
heap
page read and write
2C85000
heap
page read and write
4960000
direct allocation
page read and write
2CC2000
heap
page read and write
2C7F000
heap
page read and write
There are 3319 hidden memdumps, click here to show them.