By passers on the street stared at the stressed man oddly. Why isn't Elliott responding? He has absolutely no reason to ignore me!" He yelled. He was sick of this, so, he put on his sweatpants, a loose tank top, and heads out the door. "WINWORD.Octavio laid on his bed, stalking both Elliot and Ajay's social media's. "WINWORD.EXE" wrote bytes "48120075" to virtual address "0x750183DC" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "48120000" to virtual address "0x750012DC" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "48120000" to virtual address "0x7500139C" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "6012a56d" to virtual address "0x757EE324" (part of module "WININET.DLL") "WINWORD.EXE" wrote bytes "c74634d8" to virtual address "0x2F411B94" (part of module "WINWORD.EXE") "WINWORD.EXE" wrote bytes "f8110075" to virtual address "0x7501834C" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "f8110000" to virtual address "0x750012CC" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "e9695341eb" to virtual address "0x77403F8A" wrote bytes "2a50a8d9" to virtual address "0圆2A40BA8" (part of module "MSO.DLL") "WINWORD.EXE" wrote bytes "b83012a56dffe0" to virtual address "0x75E11368" (part of module "WS2_32.DLL") "WINWORD.EXE" wrote bytes "48120075" to virtual address "0x75018348" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "b84013a56dffe0" to virtual address "0x75001248" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "f8110000" to virtual address "0x75001408" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "f8110075" to virtual address "0x750183C4" (part of module "SSPICLI.DLL")
"WINWORD.EXE" wrote bytes "d5038bd9" to virtual address "0圆4F4F530" (part of module "WWLIB.DLL") "WINWORD.EXE" wrote bytes "48120075" to virtual address "0x750183C0" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "5d288bd9" to virtual address "0圆3A478E4" (part of module "OART.DLL") "WINWORD.EXE" touched file "C:\Windows\System32\en-US\" "WINWORD.EXE" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Caches\.tmp" "WINWORD.EXE" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Caches\cversions.1.db" "WINWORD.EXE" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v9\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v7\mscorwks.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v7\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v\mscorwks.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Fonts\StaticCache.dat" "WINWORD.EXE" touched file "C:\Windows\Globalization\Sorting\s" "WINWORD.EXE" touched file "C:\Windows\AppPatch\sysmain.sdb" wmf"įound a string that may be used as part of an injection method "5EDC3C46.wmf" has type "ms-windows metafont. "5C67FFC8.wmf" has type "ms-windows metafont. "735FE56B.wmf" has type "ms-windows metafont. "534BED2E.wmf" has type "ms-windows metafont. "8D9B77FE.wmf" has type "ms-windows metafont. "9DE49A7D.wmf" has type "ms-windows metafont. "6C6AE4BC.wmf" has type "ms-windows metafont. "5A2F85B3.wmf" has type "ms-windows metafont. "10BE6C9D.wmf" has type "ms-windows metafont. "E6921919.wmf" has type "ms-windows metafont. "7408F38F.wmf" has type "ms-windows metafont.
"97DF721F.wmf" has type "ms-windows metafont. "DA824BE7.wmf" has type "ms-windows metafont.
"6D424DB1.wmf" has type "ms-windows metafont. "A867FA92.wmf" has type "ms-windows metafont. "922A1C18.wmf" has type "ms-windows metafont. "F2AB64C2.wmf" has type "ms-windows metafont.
#CITRIX WORKSPACE DOWNLOAD FOR HSN ARCHIVE#
"CaixaBank9333991963584184.LNK" has type "MS Windows shortcut Item id list present Points to a file or directory Has Relative path Archive ctime=Fri Sep 20 08:53:10 2019 mtime=Fri Sep 20 08:53:10 2019 atime=Fri Sep 20 08:53:18 2019 length=260096 window=hide"