![]() "WINWORD.EXE" touched file "%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.MSO\9A3D50EE.wmf" Reads information about supported languages "WINWORD.EXE" wrote bytes "e99e48d0f1" to virtual address "0x75DF3D01" wrote bytes "0233db8b" to virtual address "0圆2BCBE64" (part of module "WPFT632.CNV") "WINWORD.EXE" wrote bytes "00000000" to virtual address "0圆2BEBE64" (part of module "USP10.DLL") ![]() "WINWORD.EXE" wrote bytes "cf9cbe55" to virtual address "0圆2D710AC" (part of module "MSPTLS.DLL") "WINWORD.EXE" wrote bytes "1ac064fd" to virtual address "0圆2C0BE64" (part of module "USP10.DLL") "WINWORD.EXE" wrote bytes "6689b518" to virtual address "0圆2BC63DC" (part of module "WPFT632.CNV") "WINWORD.EXE" wrote bytes "00668985" to virtual address "0圆2BA7FA4" (part of module "WPFT632.CNV") "WINWORD.EXE" wrote bytes "7373ad71" to virtual address "0圆A40F530" (part of module "WWLIB.DLL") "WINWORD.EXE" wrote bytes "e95d0956" to virtual address "0圆7D50BA8" (part of module "MSO.DLL") "WINWORD.EXE" wrote bytes "3641ad71" to virtual address "0圆8D578E4" (part of module "OART.DLL") "WINWORD.EXE" wrote bytes "78636570" to virtual address "0圆2BDBE64" (part of module "WPFT632.CNV") "WINWORD.EXE" wrote bytes "00000000" to virtual address "0圆2BE7FA4" (part of module "USP10.DLL") "WINWORD.EXE" wrote bytes "e99a5461f0" to virtual address "0x77513E59" wrote bytes "e9c53210f2" to virtual address "0x75FD6143" wrote bytes "e9239964f0" to virtual address "0x77515DEE" wrote bytes "b98049e6" to virtual address "0x2F571B94" (part of module "WINWORD.EXE") "WINWORD.EXE" wrote bytes "e454ad71" to virtual address "0圆A08CA70" (part of module "GFX.DLL") "05ffddfcfffed3fcfbfec9fcf8febefcf7feb3fcf8fea8fcfbfe9efcfffe96fc05ff8efc0cff87fc15ff82fc1eff7ffc28ff7bfc1eff76fc15ff6ffc0cff68fc" (Indicator: "bfe")
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |