nbgasil.blogg.se

Superscribe .net
Superscribe .net








"WINWORD.EXE" wrote bytes "e8126e7c" to virtual address "0圆2699904" (part of module "RICHED20.DLL") "WINWORD.EXE" wrote bytes "e99e4878f0" to virtual address "0x76D63D01" wrote bytes "e92399e5f1" to virtual address "0x756F5DEE" wrote bytes "996aae19" to virtual address "0圆9A7CA70" (part of module "GFX.DLL") "WINWORD.EXE" wrote bytes "4a8c0256" to virtual address "0圆1EC42C4" (part of module "MSPROOF7.DLL") "WINWORD.EXE" wrote bytes "9f491b10" to virtual address "0圆2311F20" (part of module "VBE7.DLL") "WINWORD.EXE" wrote bytes "1c92b119" to virtual address "0圆87478E4" (part of module "OART.DLL") "WINWORD.EXE" wrote bytes "b5f18b19" to virtual address "0圆7740BA8" (part of module "MSO.DLL") Uses a User Agent typical for browsers, although no browser was ever launched "WINWORD.EXE" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\.tmp" "WINWORD.EXE" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\cversions.1.db" "WINWORD.EXE" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v9\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v7\mscorwks.dll"

superscribe .net

"WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v7\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v\mscorwks.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v\clr.dll"

superscribe .net superscribe .net

"WINWORD.EXE" touched file "C:\Windows\Fonts\staticcache.dat" "WINWORD.EXE" touched file "%WINDIR%\Globalization\Sorting\s"

#Superscribe .net windows

References security related windows services








Superscribe .net