![]() "" wrote bytes "b4360200" to virtual address "0x74A04EA4" (part of module "SSPICLI.DLL") "" wrote bytes "b436a074" to virtual address "0x74A10200" (part of module "SSPICLI.DLL") "" wrote bytes "d83aa074" to virtual address "0x74A101E0" (part of module "SSPICLI.DLL") Opens the Kernel Security Device Driver (KsecDD) of Windows "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pftCAAA.tmp" with delete access "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pftCA8A.tmp" with delete access "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pft3108.tmp" with delete access ![]() "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pft30F7.tmp" with delete access "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pftA37B.tmp" with delete access "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pftA36B.tmp" with delete access "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pft21C6.tmp" with delete access "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pft21B6.tmp" with delete access "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pftAB4B.tmp" with delete access ![]() ![]() "" opened "C:\Users\%USERNAME%\AppData\Local\Temp\pftAB5C.tmp" with delete access "" opened "%TEMP%\pft937C.tmp" with delete access ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |