Detections

Yara:

AgentTeslaV2

Analysis

Category Package Started Completed Duration Options Log
FILE exe 2020-06-22 14:41:21 2020-06-22 14:47:39 378 seconds Show Options Show Log
route = tor
2020-05-13 09:31:20,969 [root] INFO: Date set to: 20200622T11:39:58, timeout set to: 200
2020-06-22 11:39:58,062 [root] DEBUG: Starting analyzer from: C:\tmplodztmkc
2020-06-22 11:39:58,062 [root] DEBUG: Storing results at: C:\HoZMpLMt
2020-06-22 11:39:58,062 [root] DEBUG: Pipe server name: \\.\PIPE\Zzflunjx
2020-06-22 11:39:58,062 [root] DEBUG: Python path: C:\Users\Louise\AppData\Local\Programs\Python\Python38-32
2020-06-22 11:39:58,062 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-06-22 11:39:58,078 [root] INFO: Automatically selected analysis package "exe"
2020-06-22 11:39:58,078 [root] DEBUG: Trying to import analysis package "exe"...
2020-06-22 11:39:58,781 [root] DEBUG: Imported analysis package "exe".
2020-06-22 11:39:58,781 [root] DEBUG: Trying to initialize analysis package "exe"...
2020-06-22 11:39:58,781 [root] DEBUG: Initialized analysis package "exe".
2020-06-22 11:39:59,249 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.browser"...
2020-06-22 11:39:59,265 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser".
2020-06-22 11:39:59,265 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.curtain"...
2020-06-22 11:39:59,578 [root] DEBUG: Imported auxiliary module "modules.auxiliary.curtain".
2020-06-22 11:39:59,578 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.digisig"...
2020-06-22 11:39:59,703 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig".
2020-06-22 11:39:59,703 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.disguise"...
2020-06-22 11:39:59,765 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise".
2020-06-22 11:39:59,765 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.human"...
2020-06-22 11:39:59,765 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human".
2020-06-22 11:39:59,765 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.procmon"...
2020-06-22 11:39:59,875 [root] DEBUG: Imported auxiliary module "modules.auxiliary.procmon".
2020-06-22 11:39:59,890 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.screenshots"...
2020-06-22 11:39:59,968 [modules.auxiliary.screenshots] DEBUG: Importing 'time'
2020-06-22 11:39:59,968 [modules.auxiliary.screenshots] DEBUG: Importing 'StringIO'
2020-06-22 11:39:59,968 [modules.auxiliary.screenshots] DEBUG: Importing 'Thread'
2020-06-22 11:39:59,968 [modules.auxiliary.screenshots] DEBUG: Importing 'Auxiliary'
2020-06-22 11:39:59,968 [modules.auxiliary.screenshots] DEBUG: Importing 'NetlogFile'
2020-06-22 11:39:59,968 [modules.auxiliary.screenshots] DEBUG: Importing 'Screenshot'
2020-06-22 11:40:00,000 [lib.api.screenshot] DEBUG: Importing 'math'
2020-06-22 11:40:00,000 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2020-06-22 11:40:05,187 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2020-06-22 11:40:05,406 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2020-06-22 11:40:06,187 [modules.auxiliary.screenshots] DEBUG: Imports OK
2020-06-22 11:40:06,187 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots".
2020-06-22 11:40:06,187 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.sysmon"...
2020-06-22 11:40:06,187 [root] DEBUG: Imported auxiliary module "modules.auxiliary.sysmon".
2020-06-22 11:40:06,187 [root] DEBUG: Trying to import auxiliary module "modules.auxiliary.usage"...
2020-06-22 11:40:06,453 [root] DEBUG: Imported auxiliary module "modules.auxiliary.usage".
2020-06-22 11:40:06,453 [root] DEBUG: Trying to initialize auxiliary module "Browser"...
2020-06-22 11:40:06,453 [root] DEBUG: Initialized auxiliary module "Browser".
2020-06-22 11:40:06,453 [root] DEBUG: Trying to start auxiliary module "Browser"...
2020-06-22 11:40:06,453 [root] DEBUG: Started auxiliary module Browser
2020-06-22 11:40:06,453 [root] DEBUG: Trying to initialize auxiliary module "Curtain"...
2020-06-22 11:40:06,468 [root] DEBUG: Initialized auxiliary module "Curtain".
2020-06-22 11:40:06,468 [root] DEBUG: Trying to start auxiliary module "Curtain"...
2020-06-22 11:40:06,468 [root] DEBUG: Started auxiliary module Curtain
2020-06-22 11:40:06,468 [root] DEBUG: Trying to initialize auxiliary module "DigiSig"...
2020-06-22 11:40:06,468 [root] DEBUG: Initialized auxiliary module "DigiSig".
2020-06-22 11:40:06,468 [root] DEBUG: Trying to start auxiliary module "DigiSig"...
2020-06-22 11:40:06,468 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature.
2020-06-22 11:40:09,062 [modules.auxiliary.digisig] DEBUG: File is not signed.
2020-06-22 11:40:09,062 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2020-06-22 11:40:09,093 [root] DEBUG: Started auxiliary module DigiSig
2020-06-22 11:40:09,109 [root] DEBUG: Trying to initialize auxiliary module "Disguise"...
2020-06-22 11:40:09,109 [root] DEBUG: Initialized auxiliary module "Disguise".
2020-06-22 11:40:09,109 [root] DEBUG: Trying to start auxiliary module "Disguise"...
2020-06-22 11:40:09,125 [root] DEBUG: Started auxiliary module Disguise
2020-06-22 11:40:09,125 [root] DEBUG: Trying to initialize auxiliary module "Human"...
2020-06-22 11:40:09,125 [root] DEBUG: Initialized auxiliary module "Human".
2020-06-22 11:40:09,125 [root] DEBUG: Trying to start auxiliary module "Human"...
2020-06-22 11:40:09,140 [root] DEBUG: Started auxiliary module Human
2020-06-22 11:40:09,140 [root] DEBUG: Trying to initialize auxiliary module "Procmon"...
2020-06-22 11:40:09,140 [root] DEBUG: Initialized auxiliary module "Procmon".
2020-06-22 11:40:09,140 [root] DEBUG: Trying to start auxiliary module "Procmon"...
2020-06-22 11:40:09,140 [root] DEBUG: Started auxiliary module Procmon
2020-06-22 11:40:09,140 [root] DEBUG: Trying to initialize auxiliary module "Screenshots"...
2020-06-22 11:40:09,140 [root] DEBUG: Initialized auxiliary module "Screenshots".
2020-06-22 11:40:09,140 [root] DEBUG: Trying to start auxiliary module "Screenshots"...
2020-06-22 11:40:09,140 [root] DEBUG: Started auxiliary module Screenshots
2020-06-22 11:40:09,140 [root] DEBUG: Trying to initialize auxiliary module "Sysmon"...
2020-06-22 11:40:09,156 [root] DEBUG: Initialized auxiliary module "Sysmon".
2020-06-22 11:40:09,156 [root] DEBUG: Trying to start auxiliary module "Sysmon"...
2020-06-22 11:40:09,156 [root] DEBUG: Started auxiliary module Sysmon
2020-06-22 11:40:09,156 [root] DEBUG: Trying to initialize auxiliary module "Usage"...
2020-06-22 11:40:09,156 [root] DEBUG: Initialized auxiliary module "Usage".
2020-06-22 11:40:09,156 [root] DEBUG: Trying to start auxiliary module "Usage"...
2020-06-22 11:40:09,156 [root] DEBUG: Started auxiliary module Usage
2020-06-22 11:40:09,156 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option
2020-06-22 11:40:09,156 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option
2020-06-22 11:40:09,156 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader option
2020-06-22 11:40:09,156 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader_64 option
2020-06-22 11:40:09,187 [lib.api.process] INFO: Successfully executed process from path "C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe" with arguments "" with pid 1372
2020-06-22 11:40:09,187 [lib.api.process] INFO: Monitor config for process 1372: C:\tmplodztmkc\dll\1372.ini
2020-06-22 11:40:09,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:09,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:09,328 [root] DEBUG: Loader: Injecting process 1372 (thread 4668) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:09,328 [root] DEBUG: Process image base: 0x009D0000
2020-06-22 11:40:09,328 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:09,328 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:09,328 [root] DEBUG: Error 2 (0x2) - Loader: Failed to call named pipe \\.\PIPE\Zzflunjx: The system cannot find the file specified.
2020-06-22 11:40:09,343 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1372
2020-06-22 11:40:11,343 [lib.api.process] INFO: Successfully resumed process with pid 1372
2020-06-22 11:40:11,375 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:40:11,375 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:40:11,390 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 1372 at 0x6f4a0000, image base 0x9d0000, stack from 0x2a5000-0x2b0000
2020-06-22 11:40:11,390 [root] DEBUG: Commandline: C:\Users\Louise\AppData\Local\Temp\"C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe".
2020-06-22 11:40:11,437 [root] INFO: Loaded monitor into process with pid 1372
2020-06-22 11:40:11,453 [root] DEBUG: set_caller_info: Adding region at 0x001B0000 to caller regions list (advapi32::RegQueryInfoKeyW).
2020-06-22 11:40:11,453 [root] DEBUG: set_caller_info: Adding region at 0x021C0000 to caller regions list (ntdll::RtlDispatchException).
2020-06-22 11:40:11,468 [root] DEBUG: DumpMemory: Exception occured reading memory address 0x21c0000
2020-06-22 11:40:11,468 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x021C0000 size 0x400000.
2020-06-22 11:40:11,468 [root] DEBUG: DumpPEsInRange: Scanning range 0x21c0000 - 0x21c1000.
2020-06-22 11:40:11,468 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x21c0000-0x21c1000.
2020-06-22 11:40:11,531 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\1372_155149964811401822162020 (size 0xffe)
2020-06-22 11:40:11,531 [root] DEBUG: DumpRegion: Dumped stack region from 0x021C0000, size 0x1000.
2020-06-22 11:40:11,531 [root] DEBUG: set_caller_info: Failed to dumping calling PE image at 0x001B0000.
2020-06-22 11:40:11,546 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xd0 amd local view 0x729C0000 to global list.
2020-06-22 11:40:11,546 [root] DEBUG: DLL loaded at 0x729C0000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei (0x7d000 bytes).
2020-06-22 11:40:11,546 [root] DEBUG: DLL unloaded from 0x74A80000.
2020-06-22 11:40:11,562 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xec amd local view 0x036E0000 to global list.
2020-06-22 11:40:11,578 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xe8 amd local view 0x036E0000 to global list.
2020-06-22 11:40:11,578 [root] DEBUG: DLL loaded at 0x73390000: C:\Windows\system32\VERSION (0x9000 bytes).
2020-06-22 11:40:11,593 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6EEE0000 for section view with handle 0xe8.
2020-06-22 11:40:11,609 [root] DEBUG: DLL loaded at 0x6EEE0000: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks (0x5b1000 bytes).
2020-06-22 11:40:11,609 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6EE40000 for section view with handle 0xec.
2020-06-22 11:40:11,625 [root] DEBUG: DLL loaded at 0x6EE40000: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\MSVCR80 (0x9b000 bytes).
2020-06-22 11:40:11,656 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 1372, handle 0xf8.
2020-06-22 11:40:11,656 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xf4 amd local view 0x00120000 to global list.
2020-06-22 11:40:11,656 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xfc amd local view 0x00130000 to global list.
2020-06-22 11:40:11,656 [root] INFO: Disabling sleep skipping.
2020-06-22 11:40:11,656 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 1372.
2020-06-22 11:40:11,671 [root] DEBUG: DLL loaded at 0x75180000: C:\Windows\syswow64\shell32 (0xc4c000 bytes).
2020-06-22 11:40:11,671 [root] DEBUG: DLL loaded at 0x740A0000: C:\Windows\system32\profapi (0xb000 bytes).
2020-06-22 11:40:11,687 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 1372.
2020-06-22 11:40:11,703 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1b8 amd local view 0x6E340000 to global list.
2020-06-22 11:40:11,703 [root] DEBUG: DLL loaded at 0x6E340000: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\f8420d8c6ede777377fcff48a4beaa2a\mscorlib.ni (0xafe000 bytes).
2020-06-22 11:40:11,718 [root] DEBUG: DLL unloaded from 0x74DF0000.
2020-06-22 11:40:11,781 [root] DEBUG: set_caller_info: Adding region at 0x037C0000 to caller regions list (kernel32::SetErrorMode).
2020-06-22 11:40:11,859 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0x37fffff
2020-06-22 11:40:11,859 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x037C0000 size 0x40000.
2020-06-22 11:40:11,859 [root] DEBUG: DumpPEsInRange: Scanning range 0x37c0000 - 0x37c1000.
2020-06-22 11:40:11,859 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x37c0000-0x37c1000.
2020-06-22 11:40:11,890 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\1372_63565544811401822162020 (size 0xffe)
2020-06-22 11:40:11,890 [root] DEBUG: DumpRegion: Dumped stack region from 0x037C0000, size 0x1000.
2020-06-22 11:40:11,906 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1cc amd local view 0x003C0000 to global list.
2020-06-22 11:40:11,906 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1c8 amd local view 0x03F00000 to global list.
2020-06-22 11:40:11,906 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6E2E0000 for section view with handle 0x1c8.
2020-06-22 11:40:11,906 [root] DEBUG: DLL loaded at 0x6E2E0000: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorjit (0x5b000 bytes).
2020-06-22 11:40:13,093 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1dc amd local view 0x707C0000 to global list.
2020-06-22 11:40:13,093 [root] DEBUG: DLL loaded at 0x707C0000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System\0a65164b17e5c64bacdc694ea2439c43\System.ni (0x7a5000 bytes).
2020-06-22 11:40:13,093 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x70630000 for section view with handle 0x1dc.
2020-06-22 11:40:13,093 [root] DEBUG: DLL loaded at 0x70630000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\175df210b784212def386595c25caefb\System.Drawing.ni (0x189000 bytes).
2020-06-22 11:40:13,109 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6FA50000 for section view with handle 0x1dc.
2020-06-22 11:40:13,109 [root] DEBUG: DLL loaded at 0x6FA50000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\5669120680b52abf616f3876387ca2cc\System.Windows.Forms.ni (0xbdf000 bytes).
2020-06-22 11:40:14,484 [root] DEBUG: set_caller_info: Adding region at 0x004F0000 to caller regions list (ntdll::NtAllocateVirtualMemory).
2020-06-22 11:40:14,515 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0x4fffff
2020-06-22 11:40:14,515 [root] DEBUG: DumpMemory: Nothing to dump at 0x004F0000!
2020-06-22 11:40:14,515 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x004F0000 size 0x10000.
2020-06-22 11:40:14,515 [root] DEBUG: DumpPEsInRange: Scanning range 0x4f0000 - 0x4f1000.
2020-06-22 11:40:14,515 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x4f0000-0x4f1000.
2020-06-22 11:40:14,546 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\1372_118069132514401822162020 (size 0xb3)
2020-06-22 11:40:14,546 [root] DEBUG: DumpRegion: Dumped stack region from 0x004F0000, size 0x1000.
2020-06-22 11:40:14,671 [root] DEBUG: DLL loaded at 0x73FA0000: C:\Windows\system32\uxtheme (0x80000 bytes).
2020-06-22 11:40:14,687 [root] DEBUG: set_caller_info: Adding region at 0x00190000 to caller regions list (ntdll::LdrGetProcedureAddress).
2020-06-22 11:40:14,687 [root] DEBUG: set_caller_info: Failed to dumping calling PE image at 0x00190000.
2020-06-22 11:40:14,687 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1e8 amd local view 0x6DDD0000 to global list.
2020-06-22 11:40:17,078 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1f0 amd local view 0x6F8B0000 to global list.
2020-06-22 11:40:17,078 [root] DEBUG: DLL loaded at 0x6F8B0000: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.24308_none_5c028e37a0121035\gdiplus (0x192000 bytes).
2020-06-22 11:40:17,093 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1fc amd local view 0x00530000 to global list.
2020-06-22 11:40:17,218 [root] INFO: Added new file to list with pid None and path C:\Users\Louise\AppData\Local\GDIPFONTCACHEV1.DAT
2020-06-22 11:40:17,234 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x204 amd local view 0x00530000 to global list.
2020-06-22 11:40:17,249 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x20c amd local view 0x00540000 to global list.
2020-06-22 11:40:17,421 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06640000 for section view with handle 0x20c.
2020-06-22 11:40:17,531 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:17,656 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06640000 for section view with handle 0x20c.
2020-06-22 11:40:17,718 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:17,765 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06920000 for section view with handle 0x20c.
2020-06-22 11:40:18,140 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03940000 for section view with handle 0x20c.
2020-06-22 11:40:18,578 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:18,843 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03940000 for section view with handle 0x20c.
2020-06-22 11:40:19,031 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:19,171 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:19,625 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:20,281 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:20,500 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06920000 for section view with handle 0x20c.
2020-06-22 11:40:21,390 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:21,484 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:21,640 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:21,687 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:21,765 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:21,843 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:21,906 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:21,953 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:22,187 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06920000 for section view with handle 0x20c.
2020-06-22 11:40:22,750 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:22,781 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:22,812 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:22,875 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07EB0000 for section view with handle 0x20c.
2020-06-22 11:40:23,015 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06920000 for section view with handle 0x20c.
2020-06-22 11:40:23,125 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07EB0000 for section view with handle 0x20c.
2020-06-22 11:40:23,265 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06920000 for section view with handle 0x20c.
2020-06-22 11:40:23,328 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07EB0000 for section view with handle 0x20c.
2020-06-22 11:40:23,687 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:23,750 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07EB0000 for section view with handle 0x20c.
2020-06-22 11:40:23,937 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:24,046 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:24,109 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:24,359 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:24,515 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:24,625 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:24,687 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:24,796 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07EB0000 for section view with handle 0x20c.
2020-06-22 11:40:24,921 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:24,953 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:24,984 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:25,031 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03940000 for section view with handle 0x20c.
2020-06-22 11:40:25,093 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:25,171 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:25,234 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:25,281 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:25,328 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:25,359 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:25,390 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:25,421 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03940000 for section view with handle 0x20c.
2020-06-22 11:40:25,437 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:25,484 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:25,625 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:25,734 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:25,859 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:25,937 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:25,984 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:26,109 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:26,249 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:26,359 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:26,421 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:26,453 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:26,562 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:26,703 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:26,921 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:27,109 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:27,531 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:29,062 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07EB0000 for section view with handle 0x20c.
2020-06-22 11:40:30,890 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:32,093 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:32,578 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:32,656 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:32,687 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:32,843 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:32,968 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:33,078 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:33,218 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:33,265 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:33,375 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:33,671 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:33,765 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x06640000 for section view with handle 0x20c.
2020-06-22 11:40:33,890 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:34,390 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:34,453 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:34,484 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:34,515 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:34,703 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x20c.
2020-06-22 11:40:34,750 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:34,796 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x08E80000 for section view with handle 0x20c.
2020-06-22 11:40:35,671 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:40,562 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x08E80000 for section view with handle 0x20c.
2020-06-22 11:40:41,015 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:42,781 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:42,890 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:42,937 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:43,015 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:43,062 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:43,171 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:43,203 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:43,249 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x07120000 for section view with handle 0x20c.
2020-06-22 11:40:43,515 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:43,578 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00960000 for section view with handle 0x20c.
2020-06-22 11:40:43,843 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:43,968 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:43,968 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:44,015 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:44,046 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x005A0000 for section view with handle 0x20c.
2020-06-22 11:40:44,078 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00540000 for section view with handle 0x20c.
2020-06-22 11:40:44,484 [root] DEBUG: set_caller_info: Adding region at 0x00530000 to caller regions list (ntdll::memcpy).
2020-06-22 11:40:44,515 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0x53ffff
2020-06-22 11:40:44,515 [root] DEBUG: DumpMemory: Nothing to dump at 0x00530000!
2020-06-22 11:40:44,515 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x00530000 size 0x10000.
2020-06-22 11:40:44,531 [root] DEBUG: DumpPEsInRange: Scanning range 0x530000 - 0x531000.
2020-06-22 11:40:44,531 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x530000-0x531000.
2020-06-22 11:40:44,546 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\1372_45915500944401822162020 (size 0xdb)
2020-06-22 11:40:44,546 [root] DEBUG: DumpRegion: Dumped stack region from 0x00530000, size 0x1000.
2020-06-22 11:40:44,593 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x08E80000 for section view with handle 0x20c.
2020-06-22 11:40:44,671 [root] DEBUG: DLL loaded at 0x6E160000: C:\Windows\system32\WindowsCodecs (0x131000 bytes).
2020-06-22 11:40:44,890 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x218 amd local view 0x00560000 to global list.
2020-06-22 11:40:44,953 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x220 amd local view 0x005A0000 to global list.
2020-06-22 11:40:45,031 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x228 amd local view 0x732B0000 to global list.
2020-06-22 11:40:45,031 [root] DEBUG: DLL loaded at 0x732B0000: C:\Windows\Microsoft.NET\Framework\v2.0.50727\culture (0x8000 bytes).
2020-06-22 11:40:45,046 [root] DEBUG: DLL unloaded from 0x732B0000.
2020-06-22 11:40:45,062 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03720000 for section view with handle 0x228.
2020-06-22 11:40:45,359 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x224 amd local view 0x6DFC0000 to global list.
2020-06-22 11:40:45,375 [root] DEBUG: DLL loaded at 0x6DFC0000: C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\4ac828c8c4c76f3ba59f8f9c7dab1cb3\Microsoft.VisualBasic.ni (0x19b000 bytes).
2020-06-22 11:40:45,421 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00580000 for section view with handle 0x228.
2020-06-22 11:40:55,781 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00760000 for section view with handle 0x228.
2020-06-22 11:40:55,781 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00770000 for section view with handle 0x228.
2020-06-22 11:40:55,796 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x00780000 for section view with handle 0x228.
2020-06-22 11:40:56,109 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x03F00000 for section view with handle 0x224.
2020-06-22 11:40:56,718 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:56,718 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:56,718 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:56,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:56,765 [root] DEBUG: Loader: Injecting process 3576 (thread 3580) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:56,765 [root] DEBUG: Process image base: 0x009D0000
2020-06-22 11:40:56,765 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:56,765 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:56,765 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:56,781 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:56,781 [root] DEBUG: DLL loaded at 0x74930000: C:\Windows\system32\apphelp (0x4c000 bytes).
2020-06-22 11:40:56,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3576, ImageBase: 0x009D0000
2020-06-22 11:40:56,812 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:56,812 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:56,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:56,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:56,828 [root] DEBUG: Loader: Injecting process 3576 (thread 3580) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:56,828 [root] DEBUG: Process image base: 0x009D0000
2020-06-22 11:40:56,828 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:56,828 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:56,843 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:56,843 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:56,843 [root] DEBUG: WriteMemoryHandler: Executable binary injected into process 3576 (ImageBase 0x400000)
2020-06-22 11:40:56,843 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump 'raw' PE image.
2020-06-22 11:40:56,843 [root] DEBUG: DumpPE: Instantiating PeParser with address: 0x05501428.
2020-06-22 11:40:56,875 [root] DEBUG: DumpPE: PE file in memory dumped successfully - dump size 0x49000.
2020-06-22 11:40:56,875 [root] DEBUG: WriteMemoryHandler: Dumped PE image from buffer at 0x5501428, SizeOfImage 0x50000.
2020-06-22 11:40:56,875 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:56,875 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:56,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:56,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:56,906 [root] DEBUG: Loader: Injecting process 3576 (thread 0) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:56,906 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x7EFDE000 Local PEB 0x7EFDD000 Local TEB 0x7EFDE000: The operation completed successfully.
2020-06-22 11:40:56,906 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 3580, handle 0xc4
2020-06-22 11:40:56,906 [root] DEBUG: Process image base: 0x009D0000
2020-06-22 11:40:56,906 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:56,906 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:56,906 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:56,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:56,953 [root] DEBUG: WriteMemoryHandler: injection of section of PE image which has already been dumped.
2020-06-22 11:40:56,968 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:56,968 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:56,968 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:56,984 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:56,984 [root] DEBUG: Loader: Injecting process 3576 (thread 0) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:56,984 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x7EFDE000 Local PEB 0x7EFDD000 Local TEB 0x7EFDE000: The operation completed successfully.
2020-06-22 11:40:56,984 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 3580, handle 0xc4
2020-06-22 11:40:56,984 [root] DEBUG: Process image base: 0x009D0000
2020-06-22 11:40:57,000 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:57,000 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:57,000 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:57,000 [root] DEBUG: WriteMemoryHandler: shellcode at 0x044D0B8C (size 0x400) injected into process 3576.
2020-06-22 11:40:57,031 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\1372_020411822162020 (size 0x2f8)
2020-06-22 11:40:57,031 [root] DEBUG: WriteMemoryHandler: Dumped injected code/data from buffer.
2020-06-22 11:40:57,031 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:57,031 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:57,031 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:57,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:57,062 [root] DEBUG: Loader: Injecting process 3576 (thread 0) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,062 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x7EFDE000 Local PEB 0x7EFDD000 Local TEB 0x7EFDE000: The operation completed successfully.
2020-06-22 11:40:57,062 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 3580, handle 0xc4
2020-06-22 11:40:57,062 [root] DEBUG: Process image base: 0x009D0000
2020-06-22 11:40:57,062 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:57,062 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:57,062 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:57,078 [root] DEBUG: WriteMemoryHandler: shellcode at 0x044D0F98 (size 0x200) injected into process 3576.
2020-06-22 11:40:57,078 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\1372_65917321020411822162020 (size 0x9)
2020-06-22 11:40:57,078 [root] DEBUG: WriteMemoryHandler: Dumped injected code/data from buffer.
2020-06-22 11:40:57,093 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:57,093 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:57,093 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:57,109 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:57,109 [root] DEBUG: Loader: Injecting process 3576 (thread 0) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,109 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x7EFDE000 Local PEB 0x7EFDD000 Local TEB 0x7EFDE000: The operation completed successfully.
2020-06-22 11:40:57,109 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 3580, handle 0xc4
2020-06-22 11:40:57,109 [root] DEBUG: Process image base: 0x009D0000
2020-06-22 11:40:57,109 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:57,109 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:57,125 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:57,125 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:57,125 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:57,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:57,156 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:57,156 [root] DEBUG: Loader: Injecting process 3576 (thread 0) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,156 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x7EFDE000 Local PEB 0x7EFDD000 Local TEB 0x7EFDE000: The operation completed successfully.
2020-06-22 11:40:57,156 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 3580, handle 0xc4
2020-06-22 11:40:57,156 [root] DEBUG: Process image base: 0x00400000
2020-06-22 11:40:57,156 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:57,156 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:57,171 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:57,171 [root] DEBUG: SetThreadContextHandler: Hollow process entry point reset via NtSetContextThread to 0x0004A6FE (process 3576).
2020-06-22 11:40:57,171 [root] INFO: Announced 32-bit process name: zbuFITgIccG.exe pid: 3576
2020-06-22 11:40:57,171 [lib.api.process] INFO: Monitor config for process 3576: C:\tmplodztmkc\dll\3576.ini
2020-06-22 11:40:57,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplodztmkc\dll\jKoxQIns.dll, loader C:\tmplodztmkc\bin\tDQIeIJ.exe
2020-06-22 11:40:57,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:40:57,203 [root] DEBUG: Loader: Injecting process 3576 (thread 3580) with C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,203 [root] DEBUG: Process image base: 0x00400000
2020-06-22 11:40:57,203 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2020-06-22 11:40:57,203 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2020-06-22 11:40:57,218 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jKoxQIns.dll.
2020-06-22 11:40:57,218 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-06-22 11:40:57,218 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:40:57,234 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:40:57,234 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:40:57,249 [root] INFO: Disabling sleep skipping.
2020-06-22 11:40:57,249 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 3576 at 0x6f4a0000, image base 0x400000, stack from 0x236000-0x240000
2020-06-22 11:40:57,249 [root] DEBUG: Commandline: C:\Users\Louise\AppData\Local\Temp\"{path}".
2020-06-22 11:40:57,312 [root] INFO: Loaded monitor into process with pid 3576
2020-06-22 11:40:57,312 [root] DEBUG: set_caller_info: Adding region at 0x00090000 to caller regions list (ntdll::LdrLoadDll).
2020-06-22 11:40:57,312 [root] DEBUG: set_caller_info: Adding region at 0x02540000 to caller regions list (kernel32::GetSystemTime).
2020-06-22 11:40:57,328 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 1372.
2020-06-22 11:40:57,328 [root] DEBUG: DumpMemory: Exception occured reading memory address 0x2540000
2020-06-22 11:40:57,343 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x02540000 size 0x400000.
2020-06-22 11:40:57,343 [root] DEBUG: DLL loaded at 0x74130000: C:\Windows\system32\CRYPTSP (0x17000 bytes).
2020-06-22 11:40:57,343 [root] DEBUG: DumpPEsInRange: Scanning range 0x2540000 - 0x2541000.
2020-06-22 11:40:57,343 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x2540000-0x2541000.
2020-06-22 11:40:57,359 [root] DEBUG: DLL loaded at 0x74040000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2020-06-22 11:40:57,359 [root] DEBUG: DLL loaded at 0x732F0000: C:\Windows\system32\RpcRtRemote (0xe000 bytes).
2020-06-22 11:40:57,375 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_199609276957401822162020 (size 0x597)
2020-06-22 11:40:57,375 [root] DEBUG: DumpRegion: Dumped stack region from 0x02540000, size 0x1000.
2020-06-22 11:40:57,375 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 1372
2020-06-22 11:40:57,375 [root] DEBUG: GetHookCallerBase: thread 4668 (handle 0x0), return address 0x004F3983, allocation base 0x004F0000.
2020-06-22 11:40:57,375 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x009D0000.
2020-06-22 11:40:57,375 [root] DEBUG: LooksLikeSectionBoundary: Exception occured reading around suspected boundary at 0x009D2000
2020-06-22 11:40:57,390 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump 'raw' PE image.
2020-06-22 11:40:57,390 [root] DEBUG: DumpPE: Instantiating PeParser with address: 0x009D0000.
2020-06-22 11:40:57,390 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_14117033357401822162020 (size 0x12b)
2020-06-22 11:40:57,390 [root] DEBUG: DumpRegion: Dumped stack region from 0x00090000, size 0x1000.
2020-06-22 11:40:57,406 [root] DEBUG: DLL loaded at 0x006B0000: C:\tmplodztmkc\dll\jKoxQIns (0xd5000 bytes).
2020-06-22 11:40:57,406 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,406 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,406 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,406 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,406 [root] DEBUG: DLL unloaded from 0x006B0000.
2020-06-22 11:40:57,406 [root] DEBUG: set_caller_info: Adding region at 0x000A0000 to caller regions list (ntdll::LdrLoadDll).
2020-06-22 11:40:57,437 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_45175479457401822162020 (size 0x12b)
2020-06-22 11:40:57,437 [root] DEBUG: DLL loaded at 0x006B0000: C:\tmplodztmkc\dll\jKoxQIns (0xd5000 bytes).
2020-06-22 11:40:57,453 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,453 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,468 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,468 [root] DEBUG: DumpPE: Error: Cannot dump PE file from memory.
2020-06-22 11:40:57,468 [root] DEBUG: DumpImageInCurrentProcess: Failed to dump 'raw' PE image from 0x009D0000, dumping memory region.
2020-06-22 11:40:57,468 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,468 [root] DEBUG: DLL unloaded from 0x006B0000.
2020-06-22 11:40:57,468 [root] DEBUG: set_caller_info: Adding region at 0x000B0000 to caller regions list (ntdll::LdrLoadDll).
2020-06-22 11:40:57,484 [root] DEBUG: DLL unloaded from 0x76AB0000.
2020-06-22 11:40:57,484 [root] DEBUG: DLL unloaded from 0x6EEE0000.
2020-06-22 11:40:57,484 [root] DEBUG: DLL unloaded from 0x729C0000.
2020-06-22 11:40:57,484 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 1372
2020-06-22 11:40:57,484 [root] DEBUG: GetHookCallerBase: thread 4668 (handle 0x0), return address 0x004F3983, allocation base 0x004F0000.
2020-06-22 11:40:57,500 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x009D0000.
2020-06-22 11:40:57,500 [root] DEBUG: LooksLikeSectionBoundary: Exception occured reading around suspected boundary at 0x009D2000
2020-06-22 11:40:57,593 [root] DEBUG: DumpPE: Error: Cannot dump PE file from memory.
2020-06-22 11:40:57,593 [root] DEBUG: DumpImageInCurrentProcess: Failed to dump 'raw' PE image from 0x009D0000, dumping memory region.
2020-06-22 11:40:57,593 [root] INFO: Process with pid 1372 has terminated
2020-06-22 11:40:57,609 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_44288838457401822162020 (size 0x12b)
2020-06-22 11:40:57,609 [root] DEBUG: DumpRegion: Dumped stack region from 0x000B0000, size 0x1000.
2020-06-22 11:40:57,625 [root] DEBUG: DLL loaded at 0x006B0000: C:\tmplodztmkc\dll\jKoxQIns (0xd5000 bytes).
2020-06-22 11:40:57,671 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,703 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,703 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,703 [root] DEBUG: set_caller_info: Adding region at 0x000C0000 to caller regions list (ntdll::LdrLoadDll).
2020-06-22 11:40:57,812 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_105369043257401822162020 (size 0x12b)
2020-06-22 11:40:57,812 [root] DEBUG: DumpRegion: Dumped stack region from 0x000C0000, size 0x1000.
2020-06-22 11:40:57,812 [root] DEBUG: DLL loaded at 0x006B0000: C:\tmplodztmkc\dll\jKoxQIns (0xd5000 bytes).
2020-06-22 11:40:57,828 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,828 [root] DEBUG: set_caller_info: Adding region at 0x000D0000 to caller regions list (ntdll::LdrLoadDll).
2020-06-22 11:40:57,875 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_76252779257401822162020 (size 0x12b)
2020-06-22 11:40:57,875 [root] DEBUG: DumpRegion: Dumped stack region from 0x000D0000, size 0x1000.
2020-06-22 11:40:57,890 [root] DEBUG: DLL loaded at 0x006B0000: C:\tmplodztmkc\dll\jKoxQIns (0xd5000 bytes).
2020-06-22 11:40:57,890 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,890 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,906 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,906 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,906 [root] DEBUG: DLL unloaded from 0x006B0000.
2020-06-22 11:40:57,921 [root] DEBUG: set_caller_info: Adding region at 0x00120000 to caller regions list (ntdll::LdrLoadDll).
2020-06-22 11:40:57,937 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_183335786957401822162020 (size 0x12b)
2020-06-22 11:40:57,937 [root] DEBUG: DumpRegion: Dumped stack region from 0x00120000, size 0x1000.
2020-06-22 11:40:57,953 [root] DEBUG: DLL loaded at 0x006B0000: C:\tmplodztmkc\dll\jKoxQIns (0xd5000 bytes).
2020-06-22 11:40:57,953 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:57,953 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:57,984 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:58,093 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_210868678457401822162020 (size 0x12b)
2020-06-22 11:40:58,093 [root] DEBUG: DumpRegion: Dumped stack region from 0x00130000, size 0x1000.
2020-06-22 11:40:58,109 [root] DEBUG: DLL loaded at 0x006B0000: C:\tmplodztmkc\dll\jKoxQIns (0xd5000 bytes).
2020-06-22 11:40:58,109 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:58,109 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:58,125 [root] DEBUG: DLL unloaded from 0x731E0000.
2020-06-22 11:40:58,125 [root] DEBUG: DLL unloaded from 0x763D0000.
2020-06-22 11:40:58,125 [root] DEBUG: DLL unloaded from 0x006B0000.
2020-06-22 11:40:58,140 [root] DEBUG: set_caller_info: Adding region at 0x00140000 to caller regions list (advapi32::RegQueryInfoKeyW).
2020-06-22 11:40:58,140 [root] DEBUG: set_caller_info: Failed to dumping calling PE image at 0x00140000.
2020-06-22 11:40:58,140 [root] DEBUG: set_caller_info: Adding region at 0x00540000 to caller regions list (kernel32::FindFirstFileExW).
2020-06-22 11:40:58,156 [root] DEBUG: set_caller_info: Failed to dumping calling PE image at 0x00540000.
2020-06-22 11:40:58,156 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xdc amd local view 0x729C0000 to global list.
2020-06-22 11:40:58,156 [root] DEBUG: DLL loaded at 0x729C0000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei (0x7d000 bytes).
2020-06-22 11:40:58,156 [root] DEBUG: DLL unloaded from 0x74A80000.
2020-06-22 11:40:58,171 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xec amd local view 0x006B0000 to global list.
2020-06-22 11:40:58,171 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xe8 amd local view 0x006B0000 to global list.
2020-06-22 11:40:58,203 [root] DEBUG: DLL loaded at 0x73390000: C:\Windows\system32\VERSION (0x9000 bytes).
2020-06-22 11:40:58,234 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x709B0000 for section view with handle 0xe8.
2020-06-22 11:40:58,234 [root] DEBUG: DLL loaded at 0x709B0000: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks (0x5b1000 bytes).
2020-06-22 11:40:58,249 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x72AB0000 for section view with handle 0xec.
2020-06-22 11:40:58,265 [root] DEBUG: DLL loaded at 0x72AB0000: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\MSVCR80 (0x9b000 bytes).
2020-06-22 11:40:58,296 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 3576, handle 0xf8.
2020-06-22 11:40:58,296 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xf4 amd local view 0x002D0000 to global list.
2020-06-22 11:40:58,296 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xfc amd local view 0x002E0000 to global list.
2020-06-22 11:40:58,312 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:40:58,328 [root] DEBUG: DLL loaded at 0x75180000: C:\Windows\syswow64\shell32 (0xc4c000 bytes).
2020-06-22 11:40:58,343 [root] DEBUG: DLL loaded at 0x740A0000: C:\Windows\system32\profapi (0xb000 bytes).
2020-06-22 11:40:58,343 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:40:58,359 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1b8 amd local view 0x6FEB0000 to global list.
2020-06-22 11:40:58,375 [root] DEBUG: DLL loaded at 0x6FEB0000: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\f8420d8c6ede777377fcff48a4beaa2a\mscorlib.ni (0xafe000 bytes).
2020-06-22 11:40:58,390 [root] DEBUG: set_caller_info: Adding region at 0x002F0000 to caller regions list (kernel32::SetErrorMode).
2020-06-22 11:40:58,390 [root] DEBUG: DLL unloaded from 0x74DF0000.
2020-06-22 11:40:58,453 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0x32ffff
2020-06-22 11:40:58,484 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_56380508958401822162020 (size 0xffe)
2020-06-22 11:40:58,484 [root] DEBUG: DumpRegion: Dumped stack region from 0x002F0000, size 0x1000.
2020-06-22 11:40:58,484 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1cc amd local view 0x00450000 to global list.
2020-06-22 11:40:58,500 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1c8 amd local view 0x03F20000 to global list.
2020-06-22 11:40:58,500 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x72A50000 for section view with handle 0x1c8.
2020-06-22 11:40:58,500 [root] DEBUG: DLL loaded at 0x72A50000: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorjit (0x5b000 bytes).
2020-06-22 11:40:58,546 [root] DEBUG: set_caller_info: Adding region at 0x00C50000 to caller regions list (ntdll::NtAllocateVirtualMemory).
2020-06-22 11:40:58,578 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0xc5ffff
2020-06-22 11:40:58,578 [root] DEBUG: DumpMemory: Nothing to dump at 0x00C50000!
2020-06-22 11:40:58,578 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x00C50000 size 0x10000.
2020-06-22 11:40:58,578 [root] DEBUG: DumpPEsInRange: Scanning range 0xc50000 - 0xc5e000.
2020-06-22 11:40:58,578 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0xc50000-0xc5e000.
2020-06-22 11:40:58,625 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_133122288858401822162020 (size 0xddf7)
2020-06-22 11:40:58,625 [root] DEBUG: DumpRegion: Dumped stack region from 0x00C50000, size 0xe000.
2020-06-22 11:40:58,687 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1e0 amd local view 0x6ECF0000 to global list.
2020-06-22 11:40:58,703 [root] DEBUG: DLL loaded at 0x6ECF0000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System\0a65164b17e5c64bacdc694ea2439c43\System.ni (0x7a5000 bytes).
2020-06-22 11:40:58,718 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6FD20000 for section view with handle 0x1e0.
2020-06-22 11:40:58,734 [root] DEBUG: DLL loaded at 0x6FD20000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\175df210b784212def386595c25caefb\System.Drawing.ni (0x189000 bytes).
2020-06-22 11:40:58,734 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x6D6C0000 for section view with handle 0x1e0.
2020-06-22 11:40:58,750 [root] DEBUG: DLL loaded at 0x6D6C0000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\5669120680b52abf616f3876387ca2cc\System.Windows.Forms.ni (0xbdf000 bytes).
2020-06-22 11:40:58,828 [root] DEBUG: set_caller_info: Adding region at 0x00340000 to caller regions list (ntdll::memcpy).
2020-06-22 11:40:58,843 [root] DEBUG: set_caller_info: Failed to dumping calling PE image at 0x00340000.
2020-06-22 11:40:58,859 [root] DEBUG: MapSectionViewHandler: Updated local view to 0x004D0000 for section view with handle 0x1e0.
2020-06-22 11:40:58,859 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1e8 amd local view 0x004E0000 to global list.
2020-06-22 11:40:58,875 [root] DEBUG: DLL loaded at 0x74430000: C:\Windows\system32\bcrypt (0x17000 bytes).
2020-06-22 11:40:59,046 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1fc amd local view 0x6FB80000 to global list.
2020-06-22 11:40:59,078 [root] DEBUG: DLL loaded at 0x6FB80000: C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\4ac828c8c4c76f3ba59f8f9c7dab1cb3\Microsoft.VisualBasic.ni (0x19b000 bytes).
2020-06-22 11:40:59,203 [root] DEBUG: DLL loaded at 0x74130000: C:\Windows\system32\CRYPTSP (0x17000 bytes).
2020-06-22 11:40:59,218 [root] DEBUG: DLL loaded at 0x74040000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2020-06-22 11:40:59,234 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:40:59,265 [root] DEBUG: DLL loaded at 0x732F0000: C:\Windows\system32\RpcRtRemote (0xe000 bytes).
2020-06-22 11:40:59,281 [root] DEBUG: DLL loaded at 0x75DD0000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes).
2020-06-22 11:40:59,281 [root] DEBUG: DLL loaded at 0x76930000: C:\Windows\syswow64\OLEAUT32 (0x91000 bytes).
2020-06-22 11:40:59,375 [root] DEBUG: DLL loaded at 0x6FB40000: C:\Windows\system32\wbem\wbemdisp (0x31000 bytes).
2020-06-22 11:40:59,484 [root] DEBUG: DLL loaded at 0x6FAE0000: C:\Windows\system32\wbemcomn (0x5c000 bytes).
2020-06-22 11:40:59,515 [root] DEBUG: DLL loaded at 0x74A10000: C:\Windows\syswow64\WS2_32 (0x35000 bytes).
2020-06-22 11:40:59,515 [root] DEBUG: DLL loaded at 0x76780000: C:\Windows\syswow64\NSI (0x6000 bytes).
2020-06-22 11:40:59,578 [root] INFO: Stopping WMI Service
2020-06-22 11:41:07,531 [root] INFO: Stopped WMI Service
2020-06-22 11:41:08,062 [lib.api.process] INFO: Monitor config for process 592: C:\tmplodztmkc\dll\592.ini
2020-06-22 11:41:08,078 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmplodztmkc\dll\jUHQmO.dll, loader C:\tmplodztmkc\bin\XMAQiIyK.exe
2020-06-22 11:41:08,109 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:41:08,125 [root] DEBUG: Loader: Injecting process 592 (thread 0) with C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:08,125 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x000007FFFFFDC000 Local PEB 0x000007FFFFFDE000 Local TEB 0x000007FFFFFDA000: The operation completed successfully.
2020-06-22 11:41:08,140 [root] DEBUG: Error 299 (0x12b) - GetProcessInitialThreadId: Failed to read from process: Only part of a ReadProcessMemory or WriteProcessMemory request was completed.
2020-06-22 11:41:08,156 [root] DEBUG: InjectDll: No thread ID supplied, GetProcessInitialThreadId failed, falling back to thread injection.
2020-06-22 11:41:08,156 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:41:08,156 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:41:08,203 [root] INFO: Disabling sleep skipping.
2020-06-22 11:41:08,218 [root] DEBUG: CAPE initialised: 64-bit monitor loaded in process 592 at 0x000000006F9E0000, image base 0x00000000FFAF0000, stack from 0x00000000006C6000-0x00000000006D0000
2020-06-22 11:41:08,234 [root] DEBUG: Commandline: C:\Windows\sysnative\svchost.exe -k DcomLaunch.
2020-06-22 11:41:08,281 [root] WARNING: b'Unable to place hook on LockResource'
2020-06-22 11:41:08,281 [root] WARNING: b'Unable to hook LockResource'
2020-06-22 11:41:08,343 [root] INFO: Loaded monitor into process with pid 592
2020-06-22 11:41:08,343 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-22 11:41:08,343 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-22 11:41:08,359 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:10,359 [root] INFO: Starting WMI Service
2020-06-22 11:41:10,531 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 3344, handle 0x484.
2020-06-22 11:41:12,562 [root] INFO: Started WMI Service
2020-06-22 11:41:12,578 [lib.api.process] INFO: Monitor config for process 3344: C:\tmplodztmkc\dll\3344.ini
2020-06-22 11:41:12,593 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmplodztmkc\dll\jUHQmO.dll, loader C:\tmplodztmkc\bin\XMAQiIyK.exe
2020-06-22 11:41:12,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:41:12,625 [root] DEBUG: Loader: Injecting process 3344 (thread 0) with C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:12,625 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x000007FFFFFDB000 Local PEB 0x000007FFFFFDE000 Local TEB 0x000007FFFFFDA000: The operation completed successfully.
2020-06-22 11:41:12,625 [root] DEBUG: InjectDll: No thread ID supplied, GetProcessInitialThreadId failed, falling back to thread injection.
2020-06-22 11:41:12,625 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:41:12,640 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:41:12,640 [root] INFO: Disabling sleep skipping.
2020-06-22 11:41:12,656 [root] DEBUG: CAPE initialised: 64-bit monitor loaded in process 3344 at 0x000000006F9E0000, image base 0x00000000FFAF0000, stack from 0x0000000001406000-0x0000000001410000
2020-06-22 11:41:12,656 [root] DEBUG: Commandline: C:\Windows\sysnative\svchost.exe -k netsvcs.
2020-06-22 11:41:12,703 [root] WARNING: b'Unable to place hook on LockResource'
2020-06-22 11:41:12,703 [root] WARNING: b'Unable to hook LockResource'
2020-06-22 11:41:12,718 [root] INFO: Loaded monitor into process with pid 3344
2020-06-22 11:41:12,718 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-22 11:41:12,718 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-22 11:41:12,718 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:14,765 [root] DEBUG: DLL loaded at 0x732B0000: C:\Windows\system32\wbem\wbemprox (0xb000 bytes).
2020-06-22 11:41:14,796 [root] DEBUG: DLL loaded at 0x6F970000: C:\Windows\system32\wbemcomn2 (0x61000 bytes).
2020-06-22 11:41:15,171 [root] DEBUG: DLL loaded at 0x73200000: C:\Windows\system32\wbem\wmiutils (0x1a000 bytes).
2020-06-22 11:41:15,359 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x2a0 amd local view 0x06A10000 to global list.
2020-06-22 11:41:15,468 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x2a4 amd local view 0x6F860000 to global list.
2020-06-22 11:41:15,468 [root] DEBUG: DLL loaded at 0x6F860000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\81ab4c39c6a7c9f50721aca2db09b417\System.Management.ni (0x106000 bytes).
2020-06-22 11:41:15,546 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:41:15,625 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:41:15,703 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x2f4 amd local view 0x6F840000 to global list.
2020-06-22 11:41:15,718 [root] DEBUG: DLL loaded at 0x6F840000: C:\Windows\Microsoft.NET\Framework\v2.0.50727\wminet_utils (0x1e000 bytes).
2020-06-22 11:41:15,765 [root] DEBUG: set_caller_info: Adding region at 0x00660000 to caller regions list (ole32::CoCreateInstance).
2020-06-22 11:41:15,765 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0x66ffff
2020-06-22 11:41:15,781 [root] DEBUG: DumpMemory: Nothing to dump at 0x00660000!
2020-06-22 11:41:15,781 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x00660000 size 0x10000.
2020-06-22 11:41:15,796 [root] DEBUG: DumpPEsInRange: Scanning range 0x660000 - 0x662000.
2020-06-22 11:41:15,796 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0x660000-0x662000.
2020-06-22 11:41:15,843 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_143130168835431822162020 (size 0x1edc)
2020-06-22 11:41:15,843 [root] DEBUG: DumpRegion: Dumped stack region from 0x00660000, size 0x2000.
2020-06-22 11:41:16,062 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x308 amd local view 0x00760000 to global list.
2020-06-22 11:41:16,078 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x304 amd local view 0x00760000 to global list.
2020-06-22 11:41:16,375 [root] INFO: Added new file to list with pid None and path C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe
2020-06-22 11:41:16,453 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x310 amd local view 0x07470000 to global list.
2020-06-22 11:41:16,546 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x584 amd local view 0x00000000004C0000 to global list.
2020-06-22 11:41:16,562 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x610 amd local view 0x00000000004C0000 to global list.
2020-06-22 11:41:16,640 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 3784, handle 0x5ec.
2020-06-22 11:41:16,875 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 1344, handle 0x584.
2020-06-22 11:41:17,159 [modules.auxiliary.human] INFO: Found button "OK", clicking it
2020-06-22 11:41:18,159 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:41:18,174 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:41:18,206 [root] DEBUG: set_caller_info: Adding region at 0x00890000 to caller regions list (kernel32::GetSystemInfo).
2020-06-22 11:41:18,221 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0x89ffff
2020-06-22 11:41:18,299 [root] DEBUG: DumpMemory: Nothing to dump at 0x00890000!
2020-06-22 11:41:18,299 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x00890000 size 0x10000.
2020-06-22 11:41:18,377 [root] DEBUG: DumpPEsInRange: Scanning range 0x890000 - 0x891000.
2020-06-22 11:41:18,518 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_18159196498461822162020 (size 0x626)
2020-06-22 11:41:18,862 [root] DEBUG: DLL loaded at 0x731F0000: C:\Windows\system32\shfolder (0x5000 bytes).
2020-06-22 11:41:19,143 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x370 amd local view 0x00770000 to global list.
2020-06-22 11:41:19,315 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x378 amd local view 0x6EC30000 to global list.
2020-06-22 11:41:19,331 [root] DEBUG: DLL loaded at 0x6EC30000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Security\51fb28e8a54a8d8f6021415d47477ab4\System.Security.ni (0xb3000 bytes).
2020-06-22 11:41:19,409 [root] DEBUG: set_caller_info: Adding region at 0x00C30000 to caller regions list (kernel32::SetErrorMode).
2020-06-22 11:41:19,424 [root] DEBUG: ScanForNonZero: Exception occured reading memory address 0xc3ffff
2020-06-22 11:41:19,424 [root] DEBUG: DumpMemory: Nothing to dump at 0x00C30000!
2020-06-22 11:41:19,424 [root] DEBUG: DumpRegion: Failed to dump entire allocation from 0x00C30000 size 0x10000.
2020-06-22 11:41:19,456 [root] DEBUG: DumpPEsInRange: Scanning range 0xc30000 - 0xc35000.
2020-06-22 11:41:19,456 [root] DEBUG: ScanForDisguisedPE: No PE image located in range 0xc30000-0xc35000.
2020-06-22 11:41:19,518 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\HoZMpLMt\CAPE\3576_41082169659461822162020 (size 0x4396)
2020-06-22 11:41:19,518 [root] DEBUG: DumpRegion: Dumped stack region from 0x00C30000, size 0x5000.
2020-06-22 11:41:19,549 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:41:19,627 [root] DEBUG: DLL loaded at 0x761F0000: C:\Windows\syswow64\crypt32 (0x122000 bytes).
2020-06-22 11:41:19,643 [root] DEBUG: DLL loaded at 0x76AA0000: C:\Windows\syswow64\MSASN1 (0xc000 bytes).
2020-06-22 11:41:20,034 [root] DEBUG: DLL loaded at 0x72A40000: C:\Windows\system32\vaultcli (0xc000 bytes).
2020-06-22 11:41:20,049 [root] DEBUG: DLL unloaded from 0x76560000.
2020-06-22 11:41:20,549 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:41:21,143 [root] INFO: Announced starting service "b'VaultSvc'"
2020-06-22 11:41:21,159 [lib.api.process] INFO: Monitor config for process 472: C:\tmplodztmkc\dll\472.ini
2020-06-22 11:41:21,159 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmplodztmkc\dll\jUHQmO.dll, loader C:\tmplodztmkc\bin\XMAQiIyK.exe
2020-06-22 11:41:21,174 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:41:21,190 [root] DEBUG: Loader: Injecting process 472 (thread 0) with C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:21,190 [root] DEBUG: Error 0 (0x0) - GetProcessInitialThreadId: Remote PEB 0x000007FFFFFD5000 Local PEB 0x000007FFFFFDD000 Local TEB 0x000007FFFFFDF000: The operation completed successfully.
2020-06-22 11:41:21,190 [root] DEBUG: InjectDll: No thread ID supplied. Initial thread ID 836, handle 0xa8
2020-06-22 11:41:21,206 [root] DEBUG: Process image base: 0x00000000FF540000
2020-06-22 11:41:21,206 [root] DEBUG: InjectDllViaIAT: Not a new process, aborting IAT patch
2020-06-22 11:41:21,206 [root] DEBUG: InjectDll: IAT patching failed, falling back to thread injection.
2020-06-22 11:41:21,221 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:41:21,252 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:41:21,252 [root] INFO: Disabling sleep skipping.
2020-06-22 11:41:21,252 [root] DEBUG: CAPE initialised: 64-bit monitor loaded in process 472 at 0x000000006F9E0000, image base 0x00000000FF540000, stack from 0x0000000001566000-0x0000000001570000
2020-06-22 11:41:21,268 [root] DEBUG: Commandline: C:\Windows\sysnative\services.exe.
2020-06-22 11:41:21,299 [root] WARNING: b'Unable to place hook on LockResource'
2020-06-22 11:41:21,299 [root] WARNING: b'Unable to hook LockResource'
2020-06-22 11:41:21,315 [root] INFO: Loaded monitor into process with pid 472
2020-06-22 11:41:21,315 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-22 11:41:21,331 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-22 11:41:21,331 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:22,377 [root] INFO: Announced 64-bit process name: lsass.exe pid: 3792
2020-06-22 11:41:22,393 [lib.api.process] INFO: Monitor config for process 3792: C:\tmplodztmkc\dll\3792.ini
2020-06-22 11:41:22,424 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmplodztmkc\dll\jUHQmO.dll, loader C:\tmplodztmkc\bin\XMAQiIyK.exe
2020-06-22 11:41:22,456 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:41:22,456 [root] DEBUG: Loader: Injecting process 3792 (thread 3004) with C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:22,471 [root] DEBUG: Process image base: 0x00000000FFA50000
2020-06-22 11:41:22,471 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:22,471 [root] DEBUG: InjectDllViaIAT: Failed to allocate region in target process for new import table.
2020-06-22 11:41:22,487 [root] DEBUG: InjectDll: IAT patching failed, falling back to thread injection.
2020-06-22 11:41:22,502 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:41:22,534 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:41:22,565 [root] INFO: Disabling sleep skipping.
2020-06-22 11:41:22,565 [root] DEBUG: CAPE initialised: 64-bit monitor loaded in process 3792 at 0x000000006F9E0000, image base 0x00000000FFA50000, stack from 0x0000000000234000-0x0000000000240000
2020-06-22 11:41:22,581 [root] DEBUG: Commandline: C:\Windows\sysnative\lsass.exe.
2020-06-22 11:41:22,612 [root] WARNING: b'Unable to place hook on LockResource'
2020-06-22 11:41:22,612 [root] WARNING: b'Unable to hook LockResource'
2020-06-22 11:41:22,627 [root] INFO: Loaded monitor into process with pid 3792
2020-06-22 11:41:22,643 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-22 11:41:22,643 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-22 11:41:22,643 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:41:22,659 [root] DEBUG: CreateProcessHandler: using lpCommandLine: C:\Windows\system32\lsass.exe.
2020-06-22 11:41:22,659 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3792, ImageBase: 0x00000000FFA50000
2020-06-22 11:41:22,706 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3792.
2020-06-22 11:41:35,627 [root] DEBUG: DLL unloaded from 0x74DF0000.
2020-06-22 11:41:40,627 [root] DEBUG: DLL loaded at 0x000007FEF6570000: C:\Windows\system32\VSSAPI (0x1b0000 bytes).
2020-06-22 11:41:40,706 [root] DEBUG: DLL loaded at 0x000007FEFA150000: C:\Windows\system32\samcli (0x14000 bytes).
2020-06-22 11:41:40,737 [root] DEBUG: DLL loaded at 0x000007FEFB1C0000: C:\Windows\system32\SAMLIB (0x1d000 bytes).
2020-06-22 11:41:40,846 [root] DEBUG: DLL loaded at 0x000007FEFB1F0000: C:\Windows\system32\netutils (0xc000 bytes).
2020-06-22 11:41:40,924 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x1dc amd local view 0x0000000001340000 to global list.
2020-06-22 11:41:40,971 [root] DEBUG: DLL unloaded from 0x000007FEF64E0000.
2020-06-22 11:41:52,706 [root] INFO: Process with pid 3792 has terminated
2020-06-22 11:41:59,299 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:41:59,971 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:42:10,487 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x3d8 amd local view 0x6EA90000 to global list.
2020-06-22 11:42:10,487 [root] DEBUG: set_caller_info: Adding region at 0x00AB0000 to caller regions list (ntdll::memcpy).
2020-06-22 11:42:19,362 [root] DEBUG: DLL loaded at 0x6EA90000: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.24308_none_5c028e37a0121035\gdiplus (0x192000 bytes).
2020-06-22 11:42:19,565 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x3dc amd local view 0x6E410000 to global list.
2020-06-22 11:42:19,659 [root] DEBUG: DLL loaded at 0x6E410000: C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\b065f84b49a27b648015c08fab8cd00e\System.Xml.ni (0x53b000 bytes).
2020-06-22 11:42:19,706 [root] DEBUG: DLL loaded at 0x73220000: C:\Windows\system32\sxs (0x5f000 bytes).
2020-06-22 11:42:19,784 [root] DEBUG: DLL loaded at 0x6F810000: C:\Windows\SysWOW64\wshom.ocx (0x21000 bytes).
2020-06-22 11:42:19,799 [root] DEBUG: DLL loaded at 0x6F7F0000: C:\Windows\SysWOW64\MPR (0x12000 bytes).
2020-06-22 11:42:19,846 [root] DEBUG: DLL loaded at 0x6F7C0000: C:\Windows\SysWOW64\ScrRun (0x2a000 bytes).
2020-06-22 11:42:19,940 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0x41c amd local view 0x00BF0000 to global list.
2020-06-22 11:42:48,143 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 2028, handle 0x4c8.
2020-06-22 11:42:56,159 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:42:56,174 [root] INFO: Added new file to list with pid None and path C:\Users\Louise\AppData\Local\Temp\log.tmp
2020-06-22 11:42:58,252 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 3896, handle 0x5c0.
2020-06-22 11:42:58,440 [root] DEBUG: OpenProcessHandler: Injection info created for Pid 3684, handle 0x5c0.
2020-06-22 11:43:04,815 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 3728
2020-06-22 11:43:04,815 [lib.api.process] INFO: Monitor config for process 3728: C:\tmplodztmkc\dll\3728.ini
2020-06-22 11:43:04,815 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmplodztmkc\dll\jUHQmO.dll, loader C:\tmplodztmkc\bin\XMAQiIyK.exe
2020-06-22 11:43:04,846 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:43:04,846 [root] DEBUG: Loader: Injecting process 3728 (thread 3800) with C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:43:04,862 [root] DEBUG: Process image base: 0x00000000FFE60000
2020-06-22 11:43:04,893 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:43:04,987 [root] DEBUG: InjectDllViaIAT: Failed to allocate region in target process for new import table.
2020-06-22 11:43:05,002 [root] DEBUG: InjectDll: IAT patching failed, falling back to thread injection.
2020-06-22 11:43:05,081 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:43:05,081 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:43:05,096 [root] INFO: Disabling sleep skipping.
2020-06-22 11:43:05,096 [root] DEBUG: CAPE initialised: 64-bit monitor loaded in process 3728 at 0x000000006F9E0000, image base 0x00000000FFE60000, stack from 0x0000000000316000-0x0000000000320000
2020-06-22 11:43:05,112 [root] DEBUG: Commandline: C:\Windows\sysnative\DllHost.exe \Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}.
2020-06-22 11:43:05,174 [root] WARNING: b'Unable to place hook on LockResource'
2020-06-22 11:43:05,174 [root] WARNING: b'Unable to hook LockResource'
2020-06-22 11:43:05,221 [root] INFO: Loaded monitor into process with pid 3728
2020-06-22 11:43:05,237 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-22 11:43:05,252 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-22 11:43:05,252 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:43:05,268 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3728, ImageBase: 0x00000000FFE60000
2020-06-22 11:43:05,456 [root] DEBUG: DLL loaded at 0x000007FEFCA70000: C:\Windows\system32\CRYPTBASE (0xf000 bytes).
2020-06-22 11:43:05,471 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xb4 amd local view 0x00000000001F0000 to global list.
2020-06-22 11:43:05,471 [root] DEBUG: DLL loaded at 0x000007FEFEE80000: C:\Windows\system32\CLBCatQ (0x99000 bytes).
2020-06-22 11:43:05,487 [root] DEBUG: DLL loaded at 0x000007FEFEDA0000: C:\Windows\system32\OLEAUT32 (0xda000 bytes).
2020-06-22 11:43:05,565 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xd4 amd local view 0x0000000000200000 to global list.
2020-06-22 11:43:05,581 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xdc amd local view 0x0000000000210000 to global list.
2020-06-22 11:43:05,596 [root] DEBUG: ResumeThreadHandler: CurrentInjectionInfo 0x0 (Pid 3728).
2020-06-22 11:43:05,612 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 3728
2020-06-22 11:43:05,612 [root] DEBUG: GetHookCallerBase: thread 3800 (handle 0x0), return address 0x00000000FFE610C8, allocation base 0x00000000FFE60000.
2020-06-22 11:43:05,627 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00000000FFE60000.
2020-06-22 11:43:05,627 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-22 11:43:05,674 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00000000FFE60000.
2020-06-22 11:43:05,737 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x2600.
2020-06-22 11:43:05,752 [root] INFO: Process with pid 3728 has terminated
2020-06-22 11:43:06,362 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 1528
2020-06-22 11:43:06,362 [lib.api.process] INFO: Monitor config for process 1528: C:\tmplodztmkc\dll\1528.ini
2020-06-22 11:43:06,377 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmplodztmkc\dll\jUHQmO.dll, loader C:\tmplodztmkc\bin\XMAQiIyK.exe
2020-06-22 11:43:06,409 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\Zzflunjx.
2020-06-22 11:43:06,409 [root] DEBUG: Loader: Injecting process 1528 (thread 3888) with C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:43:06,409 [root] DEBUG: Process image base: 0x00000000FFB00000
2020-06-22 11:43:06,456 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:43:06,456 [root] DEBUG: InjectDllViaIAT: Failed to allocate region in target process for new import table.
2020-06-22 11:43:06,502 [root] DEBUG: InjectDll: IAT patching failed, falling back to thread injection.
2020-06-22 11:43:06,534 [root] DEBUG: Python path set to 'C:\Users\Louise\AppData\Local\Programs\Python\Python38-32'.
2020-06-22 11:43:06,534 [root] DEBUG: Dropped file limit defaulting to 100.
2020-06-22 11:43:06,549 [root] INFO: Disabling sleep skipping.
2020-06-22 11:43:06,565 [root] DEBUG: CAPE initialised: 64-bit monitor loaded in process 1528 at 0x000000006F9E0000, image base 0x00000000FFB00000, stack from 0x0000000000326000-0x0000000000330000
2020-06-22 11:43:06,565 [root] DEBUG: Commandline: C:\Windows\sysnative\DllHost.exe \Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}.
2020-06-22 11:43:06,643 [root] WARNING: b'Unable to place hook on LockResource'
2020-06-22 11:43:06,643 [root] WARNING: b'Unable to hook LockResource'
2020-06-22 11:43:06,659 [root] INFO: Loaded monitor into process with pid 1528
2020-06-22 11:43:06,674 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2020-06-22 11:43:06,690 [root] DEBUG: InjectDll: Successfully injected DLL via thread.
2020-06-22 11:43:06,706 [root] DEBUG: Successfully injected DLL C:\tmplodztmkc\dll\jUHQmO.dll.
2020-06-22 11:43:06,721 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1528, ImageBase: 0x00000000FFB00000
2020-06-22 11:43:06,737 [root] DEBUG: DLL loaded at 0x000007FEFCA70000: C:\Windows\system32\CRYPTBASE (0xf000 bytes).
2020-06-22 11:43:06,752 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xb4 amd local view 0x00000000001F0000 to global list.
2020-06-22 11:43:06,752 [root] DEBUG: DLL loaded at 0x000007FEFEE80000: C:\Windows\system32\CLBCatQ (0x99000 bytes).
2020-06-22 11:43:06,768 [root] DEBUG: DLL loaded at 0x000007FEFEDA0000: C:\Windows\system32\OLEAUT32 (0xda000 bytes).
2020-06-22 11:43:06,768 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xd4 amd local view 0x0000000000200000 to global list.
2020-06-22 11:43:06,768 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xdc amd local view 0x0000000000210000 to global list.
2020-06-22 11:43:06,815 [root] DEBUG: ResumeThreadHandler: CurrentInjectionInfo 0x0 (Pid 1528).
2020-06-22 11:43:06,846 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 1528
2020-06-22 11:43:06,987 [root] DEBUG: GetHookCallerBase: thread 3888 (handle 0x0), return address 0x00000000FFB010C8, allocation base 0x00000000FFB00000.
2020-06-22 11:43:07,034 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00000000FFB00000.
2020-06-22 11:43:07,034 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-22 11:43:07,127 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00000000FFB00000.
2020-06-22 11:43:19,987 [root] DEBUG: ResumeThreadHandler: Dumping section view for process 3576.
2020-06-22 11:43:31,456 [root] INFO: Analysis timeout hit, terminating analysis.
2020-06-22 11:43:31,518 [lib.api.process] INFO: Terminate event set for process 3576
2020-06-22 11:43:31,534 [root] DEBUG: Terminate Event: Attempting to dump process 3576
2020-06-22 11:43:31,534 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00400000.
2020-06-22 11:43:31,612 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-22 11:43:31,690 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00400000.
2020-06-22 11:43:31,737 [root] DEBUG: DumpProcess: Error - entry point too big: 0x73247cef, ignoring.
2020-06-22 11:43:31,799 [lib.api.process] INFO: Termination confirmed for process 3576
2020-06-22 11:43:31,799 [root] INFO: Terminate event set for process 3576.
2020-06-22 11:43:31,799 [lib.api.process] INFO: Terminate event set for process 592
2020-06-22 11:43:31,831 [root] DEBUG: Terminate Event: Attempting to dump process 592
2020-06-22 11:43:31,846 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00000000FFAF0000.
2020-06-22 11:43:31,940 [lib.api.process] INFO: Termination confirmed for process 592
2020-06-22 11:43:31,940 [root] INFO: Terminate event set for process 592.
2020-06-22 11:43:31,940 [lib.api.process] INFO: Terminate event set for process 3344
2020-06-22 11:43:32,002 [root] DEBUG: Terminate Event: Attempting to dump process 3344
2020-06-22 11:43:32,112 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00000000FFAF0000.
2020-06-22 11:43:32,174 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-22 11:43:32,346 [lib.api.process] INFO: Termination confirmed for process 3344
2020-06-22 11:43:32,346 [root] INFO: Terminate event set for process 3344.
2020-06-22 11:43:32,409 [lib.api.process] INFO: Terminate event set for process 472
2020-06-22 11:43:32,409 [root] DEBUG: Terminate Event: Attempting to dump process 472
2020-06-22 11:43:32,471 [root] DEBUG: DoProcessDump: Dumping Imagebase at 0x00000000FF540000.
2020-06-22 11:43:32,471 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-06-22 11:43:32,643 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00000000FF540000.
2020-06-22 11:43:33,065 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x50000.
2020-06-22 11:43:33,081 [root] DEBUG: Terminate Event: CAPE shutdown complete for process 472
2020-06-22 11:43:33,081 [lib.api.process] INFO: Termination confirmed for process 472
2020-06-22 11:43:33,096 [root] INFO: Terminate event set for process 472.
2020-06-22 11:43:33,096 [lib.api.process] ERROR: Failed to open terminate event for pid 1528
2020-06-22 11:43:33,096 [root] INFO: Terminate event set for process 1528.
2020-06-22 11:43:33,096 [root] INFO: Created shutdown mutex.
2020-06-22 11:43:34,096 [root] INFO: Shutting down package.
2020-06-22 11:43:34,237 [root] INFO: Stopping auxiliary modules.
2020-06-22 11:43:34,799 [lib.common.results] WARNING: File C:\HoZMpLMt\bin\procmon.xml doesn't exist anymore
2020-06-22 11:43:34,799 [root] INFO: Finishing auxiliary modules.
2020-06-22 11:43:34,815 [root] INFO: Shutting down pipe server and dumping dropped files.
2020-06-22 11:43:34,940 [root] WARNING: Folder at path "C:\HoZMpLMt\debugger" does not exist, skip.
2020-06-22 11:43:34,971 [root] INFO: Analysis completed.

Machine

Name Label Manager Started On Shutdown On
win7x64_4 win7x64_8 KVM 2020-06-22 14:41:21 2020-06-22 14:47:39

File Details

File Name zbuFITgIccG
File Size 891904 bytes
File Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
PE timestamp 2020-06-22 02:29:08
MD5 18e77defd5d83d42e5af99f86f4aa1e3
SHA1 bd47a54146802942d5c1b95fb8fa86b1742a1fbb
SHA256 ce5f535cc1c3e14dbdbfc047c821a81ef89f283ace26495298c6a698851e254d
SHA512 360d90f0adf6519c4cba77ab5fbb8b155a25a59a8a62e34d93ea7f1b652398186c8defecb61c879e4b75e77c82c563a7e09aed0fdca86b8108fe14335f56f0c4
CRC32 68B46B07
Ssdeep 12288:UYKSgfvkh6flrvsLaMPtnQV03G27ZhSxo:UTSgfMhalrEptnLj7ZhSxo
Download Download ZIP Resubmit sample

Signatures

SetUnhandledExceptionFilter detected (possible anti-debug)
Behavioural detection: Executable code extraction - unpacking
Yara rule detections observed from a process memory dump/dropped files/CAPE
Hit: PID 1372 trigged the Yara rule 'AgentTeslaV2'
Creates RWX memory
Guard pages use detected - possible anti-debugging.
A process attempted to delay the analysis task.
Process: zbuFITgIccG.exe tried to sleep 393.14 seconds, actually delayed analysis time by 0.0 seconds
Dynamic (imported) function loading detected
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryInfoKeyW
DynamicLoader: ADVAPI32.dll/RegEnumKeyExW
DynamicLoader: ADVAPI32.dll/RegEnumValueW
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: KERNEL32.dll/FlsAlloc
DynamicLoader: KERNEL32.dll/FlsFree
DynamicLoader: KERNEL32.dll/FlsGetValue
DynamicLoader: KERNEL32.dll/FlsSetValue
DynamicLoader: KERNEL32.dll/InitializeCriticalSectionEx
DynamicLoader: KERNEL32.dll/CreateEventExW
DynamicLoader: KERNEL32.dll/CreateSemaphoreExW
DynamicLoader: KERNEL32.dll/SetThreadStackGuarantee
DynamicLoader: KERNEL32.dll/CreateThreadpoolTimer
DynamicLoader: KERNEL32.dll/SetThreadpoolTimer
DynamicLoader: KERNEL32.dll/WaitForThreadpoolTimerCallbacks
DynamicLoader: KERNEL32.dll/CloseThreadpoolTimer
DynamicLoader: KERNEL32.dll/CreateThreadpoolWait
DynamicLoader: KERNEL32.dll/SetThreadpoolWait
DynamicLoader: KERNEL32.dll/CloseThreadpoolWait
DynamicLoader: KERNEL32.dll/FlushProcessWriteBuffers
DynamicLoader: KERNEL32.dll/FreeLibraryWhenCallbackReturns
DynamicLoader: KERNEL32.dll/GetCurrentProcessorNumber
DynamicLoader: KERNEL32.dll/GetLogicalProcessorInformation
DynamicLoader: KERNEL32.dll/CreateSymbolicLinkW
DynamicLoader: KERNEL32.dll/SetDefaultDllDirectories
DynamicLoader: KERNEL32.dll/EnumSystemLocalesEx
DynamicLoader: KERNEL32.dll/CompareStringEx
DynamicLoader: KERNEL32.dll/GetDateFormatEx
DynamicLoader: KERNEL32.dll/GetLocaleInfoEx
DynamicLoader: KERNEL32.dll/GetTimeFormatEx
DynamicLoader: KERNEL32.dll/GetUserDefaultLocaleName
DynamicLoader: KERNEL32.dll/IsValidLocaleName
DynamicLoader: KERNEL32.dll/LCMapStringEx
DynamicLoader: KERNEL32.dll/GetCurrentPackageId
DynamicLoader: KERNEL32.dll/GetTickCount64
DynamicLoader: KERNEL32.dll/GetFileInformationByHandleExW
DynamicLoader: KERNEL32.dll/SetFileInformationByHandleW
DynamicLoader: KERNEL32.dll/AcquireSRWLockExclusive
DynamicLoader: KERNEL32.dll/ReleaseSRWLockExclusive
DynamicLoader: ADVAPI32.dll/EventRegister
DynamicLoader: ADVAPI32.dll/EventSetInformation
DynamicLoader: MSCOREE.DLL/
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: mscoreei.dll/RegisterShimImplCallback
DynamicLoader: mscoreei.dll/RegisterShimImplCleanupCallback
DynamicLoader: mscoreei.dll/SetShellShimInstance
DynamicLoader: mscoreei.dll/OnShimDllMainCalled
DynamicLoader: mscoreei.dll/_CorExeMain_RetAddr
DynamicLoader: mscoreei.dll/_CorExeMain
DynamicLoader: SHLWAPI.dll/UrlIsW
DynamicLoader: VERSION.dll/GetFileVersionInfoSizeW
DynamicLoader: VERSION.dll/GetFileVersionInfoW
DynamicLoader: VERSION.dll/VerQueryValueW
DynamicLoader: KERNEL32.dll/FlsAlloc
DynamicLoader: KERNEL32.dll/FlsGetValue
DynamicLoader: KERNEL32.dll/FlsSetValue
DynamicLoader: KERNEL32.dll/FlsFree
DynamicLoader: KERNEL32.dll/InitializeCriticalSectionAndSpinCount
DynamicLoader: KERNEL32.dll/IsProcessorFeaturePresent
DynamicLoader: msvcrt.dll/_set_error_mode
DynamicLoader: msvcrt.dll/[email protected]@[email protected]
DynamicLoader: msvcrt.dll/_get_terminate
DynamicLoader: KERNEL32.dll/FindActCtxSectionStringW
DynamicLoader: KERNEL32.dll/GetSystemWindowsDirectoryW
DynamicLoader: MSCOREE.DLL/GetProcessExecutableHeap
DynamicLoader: mscoreei.dll/GetProcessExecutableHeap_RetAddr
DynamicLoader: mscoreei.dll/GetProcessExecutableHeap
DynamicLoader: mscorwks.dll/SetLoadedByMscoree
DynamicLoader: USER32.dll/GetProcessWindowStation
DynamicLoader: USER32.dll/GetUserObjectInformationW
DynamicLoader: mscorwks.dll/_CorExeMain
DynamicLoader: mscorwks.dll/GetCLRFunction
DynamicLoader: ADVAPI32.dll/RegisterTraceGuidsW
DynamicLoader: ADVAPI32.dll/UnregisterTraceGuids
DynamicLoader: ADVAPI32.dll/GetTraceLoggerHandle
DynamicLoader: ADVAPI32.dll/GetTraceEnableLevel
DynamicLoader: ADVAPI32.dll/GetTraceEnableFlags
DynamicLoader: ADVAPI32.dll/TraceEvent
DynamicLoader: MSCOREE.DLL/IEE
DynamicLoader: mscoreei.dll/IEE_RetAddr
DynamicLoader: mscoreei.dll/IEE
DynamicLoader: mscorwks.dll/IEE
DynamicLoader: MSCOREE.DLL/GetStartupFlags
DynamicLoader: mscoreei.dll/GetStartupFlags_RetAddr
DynamicLoader: mscoreei.dll/GetStartupFlags
DynamicLoader: MSCOREE.DLL/GetHostConfigurationFile
DynamicLoader: mscoreei.dll/GetHostConfigurationFile_RetAddr
DynamicLoader: mscoreei.dll/GetHostConfigurationFile
DynamicLoader: mscoreei.dll/GetCORVersion_RetAddr
DynamicLoader: mscoreei.dll/GetCORVersion
DynamicLoader: MSCOREE.DLL/GetCORSystemDirectory
DynamicLoader: mscoreei.dll/GetCORSystemDirectory_RetAddr
DynamicLoader: mscoreei.dll/CreateConfigStream_RetAddr
DynamicLoader: mscoreei.dll/CreateConfigStream
DynamicLoader: ntdll.dll/RtlUnwind
DynamicLoader: KERNEL32.dll/IsWow64Process
DynamicLoader: KERNEL32.dll/GetSystemWindowsDirectoryW
DynamicLoader: ADVAPI32.dll/AllocateAndInitializeSid
DynamicLoader: ADVAPI32.dll/OpenProcessToken
DynamicLoader: ADVAPI32.dll/GetTokenInformation
DynamicLoader: ADVAPI32.dll/InitializeAcl
DynamicLoader: ADVAPI32.dll/AddAccessAllowedAce
DynamicLoader: ADVAPI32.dll/FreeSid
DynamicLoader: ADVAPI32.dll/AllocateAndInitializeSid
DynamicLoader: ADVAPI32.dll/OpenProcessToken
DynamicLoader: ADVAPI32.dll/GetTokenInformation
DynamicLoader: ADVAPI32.dll/InitializeAcl
DynamicLoader: ADVAPI32.dll/AddAccessAllowedAce
DynamicLoader: ADVAPI32.dll/FreeSid
DynamicLoader: KERNEL32.dll/SetThreadStackGuarantee
DynamicLoader: KERNEL32.dll/FlsSetValue
DynamicLoader: KERNEL32.dll/FlsGetValue
DynamicLoader: KERNEL32.dll/FlsAlloc
DynamicLoader: KERNEL32.dll/FlsFree
DynamicLoader: KERNEL32.dll/AddVectoredContinueHandler
DynamicLoader: KERNEL32.dll/RemoveVectoredContinueHandler
DynamicLoader: ADVAPI32.dll/ConvertSidToStringSidW
DynamicLoader: shell32.dll/SHGetFolderPathW
DynamicLoader: KERNEL32.dll/FlushProcessWriteBuffers
DynamicLoader: KERNEL32.dll/GetWriteWatch
DynamicLoader: KERNEL32.dll/ResetWriteWatch
DynamicLoader: KERNEL32.dll/CreateMemoryResourceNotification
DynamicLoader: KERNEL32.dll/QueryMemoryResourceNotification
DynamicLoader: ole32.dll/CoInitializeEx
DynamicLoader: CRYPTBASE.dll/SystemFunction036
DynamicLoader: KERNEL32.dll/QueryActCtxW
DynamicLoader: ole32.dll/CoGetContextToken
DynamicLoader: KERNEL32.dll/GetFullPathName
DynamicLoader: KERNEL32.dll/GetFullPathNameW
DynamicLoader: KERNEL32.dll/GetVersionEx
DynamicLoader: KERNEL32.dll/GetVersionExW
DynamicLoader: KERNEL32.dll/GetVersionEx
DynamicLoader: KERNEL32.dll/GetVersionExW
DynamicLoader: ADVAPI32.dll/CryptAcquireContextA
DynamicLoader: ADVAPI32.dll/CryptReleaseContext
DynamicLoader: ADVAPI32.dll/CryptCreateHash
DynamicLoader: ADVAPI32.dll/CryptDestroyHash
DynamicLoader: ADVAPI32.dll/CryptHashData
DynamicLoader: ADVAPI32.dll/CryptGetHashParam
DynamicLoader: ADVAPI32.dll/CryptImportKey
DynamicLoader: ADVAPI32.dll/CryptExportKey
DynamicLoader: ADVAPI32.dll/CryptGenKey
DynamicLoader: ADVAPI32.dll/CryptGetKeyParam
DynamicLoader: ADVAPI32.dll/CryptDestroyKey
DynamicLoader: ADVAPI32.dll/CryptVerifySignatureA
DynamicLoader: ADVAPI32.dll/CryptSignHashA
DynamicLoader: ADVAPI32.dll/CryptGetProvParam
DynamicLoader: ADVAPI32.dll/CryptGetUserKey
DynamicLoader: ADVAPI32.dll/CryptEnumProvidersA
DynamicLoader: MSCOREE.DLL/GetMetaDataInternalInterface
DynamicLoader: mscoreei.dll/GetMetaDataInternalInterface_RetAddr
DynamicLoader: mscoreei.dll/GetMetaDataInternalInterface
DynamicLoader: mscorwks.dll/GetMetaDataInternalInterface
DynamicLoader: mscorjit.dll/getJit
DynamicLoader: KERNEL32.dll/IsWow64Process
DynamicLoader: uxtheme.dll/IsAppThemed
DynamicLoader: uxtheme.dll/IsAppThemedW
DynamicLoader: KERNEL32.dll/CreateActCtx
DynamicLoader: KERNEL32.dll/CreateActCtxA
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: USER32.dll/RegisterWindowMessage
DynamicLoader: USER32.dll/RegisterWindowMessageW
DynamicLoader: USER32.dll/GetSystemMetrics
DynamicLoader: USER32.dll/AdjustWindowRectEx
DynamicLoader: KERNEL32.dll/GetCurrentProcess
DynamicLoader: KERNEL32.dll/GetCurrentThread
DynamicLoader: KERNEL32.dll/DuplicateHandle
DynamicLoader: KERNEL32.dll/GetCurrentThreadId
DynamicLoader: KERNEL32.dll/GetCurrentActCtx
DynamicLoader: KERNEL32.dll/ActivateActCtx
DynamicLoader: KERNEL32.dll/lstrlen
DynamicLoader: KERNEL32.dll/lstrlenW
DynamicLoader: KERNEL32.dll/GetModuleHandle
DynamicLoader: KERNEL32.dll/GetModuleHandleW
DynamicLoader: KERNEL32.dll/GetProcAddress
DynamicLoader: USER32.dll/DefWindowProcW
DynamicLoader: GDI32.dll/GetStockObject
DynamicLoader: KERNEL32.dll/GetUserDefaultUILanguage
DynamicLoader: USER32.dll/RegisterClass
DynamicLoader: USER32.dll/RegisterClassW
DynamicLoader: USER32.dll/CreateWindowEx
DynamicLoader: USER32.dll/CreateWindowExW
DynamicLoader: USER32.dll/SetWindowLong
DynamicLoader: USER32.dll/SetWindowLongW
DynamicLoader: USER32.dll/GetWindowLong
DynamicLoader: USER32.dll/GetWindowLongW
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: ADVAPI32.dll/RegOpenKeyEx
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryValueEx
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: USER32.dll/SetWindowLong
DynamicLoader: USER32.dll/SetWindowLongW
DynamicLoader: USER32.dll/CallWindowProc
DynamicLoader: USER32.dll/CallWindowProcW
DynamicLoader: USER32.dll/GetClientRect
DynamicLoader: USER32.dll/GetWindowRect
DynamicLoader: USER32.dll/GetParent
DynamicLoader: KERNEL32.dll/DeactivateActCtx
DynamicLoader: USER32.dll/GetProcessWindowStation
DynamicLoader: USER32.dll/GetUserObjectInformation
DynamicLoader: USER32.dll/GetUserObjectInformationA
DynamicLoader: KERNEL32.dll/SetConsoleCtrlHandler
DynamicLoader: KERNEL32.dll/SetConsoleCtrlHandlerW
DynamicLoader: KERNEL32.dll/GetModuleHandle
DynamicLoader: KERNEL32.dll/GetModuleHandleW
DynamicLoader: USER32.dll/GetClassInfo
DynamicLoader: USER32.dll/GetClassInfoW
DynamicLoader: USER32.dll/RegisterClass
DynamicLoader: USER32.dll/RegisterClassW
DynamicLoader: USER32.dll/CreateWindowEx
DynamicLoader: USER32.dll/CreateWindowExW
DynamicLoader: USER32.dll/DefWindowProc
DynamicLoader: USER32.dll/DefWindowProcW
DynamicLoader: USER32.dll/SystemParametersInfo
DynamicLoader: USER32.dll/SystemParametersInfoW
DynamicLoader: USER32.dll/GetDC
DynamicLoader: KERNEL32.dll/GetCurrentProcessId
DynamicLoader: KERNEL32.dll/GetCurrentProcessIdW
DynamicLoader: KERNEL32.dll/FindAtom
DynamicLoader: KERNEL32.dll/FindAtomW
DynamicLoader: KERNEL32.dll/AddAtom
DynamicLoader: KERNEL32.dll/AddAtomW
DynamicLoader: MSCOREE.DLL/LoadLibraryShim
DynamicLoader: mscoreei.dll/LoadLibraryShim_RetAddr
DynamicLoader: mscoreei.dll/LoadLibraryShim
DynamicLoader: gdiplus.dll/GdiplusStartup
DynamicLoader: KERNEL32.dll/IsProcessorFeaturePresent
DynamicLoader: USER32.dll/GetWindowInfo
DynamicLoader: USER32.dll/GetAncestor
DynamicLoader: USER32.dll/GetMonitorInfoA
DynamicLoader: USER32.dll/EnumDisplayMonitors
DynamicLoader: USER32.dll/EnumDisplayDevicesA
DynamicLoader: GDI32.dll/ExtTextOutW
DynamicLoader: GDI32.dll/GdiIsMetaPrintDC
DynamicLoader: gdiplus.dll/GdipCreateFontFromLogfontW
DynamicLoader: KERNEL32.dll/RegOpenKeyExW
DynamicLoader: KERNEL32.dll/RegQueryInfoKeyA
DynamicLoader: KERNEL32.dll/RegCloseKey
DynamicLoader: KERNEL32.dll/RegCreateKeyExW
DynamicLoader: KERNEL32.dll/RegQueryValueExW
DynamicLoader: KERNEL32.dll/RegEnumValueW
DynamicLoader: MSCOREE.DLL/ND_RI2
DynamicLoader: mscoreei.dll/ND_RI2_RetAddr
DynamicLoader: mscoreei.dll/ND_RI2
DynamicLoader: MSCOREE.DLL/ND_RU1
DynamicLoader: mscoreei.dll/ND_RU1_RetAddr
DynamicLoader: mscoreei.dll/ND_RU1
DynamicLoader: gdiplus.dll/GdipGetFontUnit
DynamicLoader: gdiplus.dll/GdipGetFontSize
DynamicLoader: gdiplus.dll/GdipGetFontStyle
DynamicLoader: gdiplus.dll/GdipGetFamily
DynamicLoader: USER32.dll/ReleaseDC
DynamicLoader: gdiplus.dll/GdipCreateFromHDC
DynamicLoader: gdiplus.dll/GdipGetDpiY
DynamicLoader: gdiplus.dll/GdipGetFontHeight
DynamicLoader: gdiplus.dll/GdipGetEmHeight
DynamicLoader: gdiplus.dll/GdipGetLineSpacing
DynamicLoader: gdiplus.dll/GdipDeleteGraphics
DynamicLoader: gdiplus.dll/GdipCreateFont
DynamicLoader: USER32.dll/SystemParametersInfo
DynamicLoader: USER32.dll/SystemParametersInfoW
DynamicLoader: KERNEL32.dll/GetSystemDefaultLCID
DynamicLoader: KERNEL32.dll/GetSystemDefaultLCIDW
DynamicLoader: GDI32.dll/GetStockObject
DynamicLoader: GDI32.dll/GetObject
DynamicLoader: GDI32.dll/GetObjectW
DynamicLoader: KERNEL32.dll/RegQueryInfoKeyW
DynamicLoader: gdiplus.dll/GdipDeleteFont
DynamicLoader: gdiplus.dll/GdipCreateFontFamilyFromName
DynamicLoader: gdiplus.dll/GdipGetFamilyName
DynamicLoader: GDI32.dll/CreateCompatibleDC
DynamicLoader: GDI32.dll/GetCurrentObject
DynamicLoader: GDI32.dll/SaveDC
DynamicLoader: GDI32.dll/GetDeviceCaps
DynamicLoader: GDI32.dll/CreateFontIndirect
DynamicLoader: GDI32.dll/CreateFontIndirectW
DynamicLoader: GDI32.dll/GetObject
DynamicLoader: GDI32.dll/GetObjectW
DynamicLoader: GDI32.dll/SelectObject
DynamicLoader: GDI32.dll/GetMapMode
DynamicLoader: GDI32.dll/GetTextMetricsW
DynamicLoader: USER32.dll/DrawTextExW
DynamicLoader: USER32.dll/DrawTextExWW
DynamicLoader: GDI32.dll/GetLayout
DynamicLoader: GDI32.dll/GdiRealizationInfo
DynamicLoader: GDI32.dll/FontIsLinked
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryInfoKeyW
DynamicLoader: GDI32.dll/GetTextFaceAliasW
DynamicLoader: ADVAPI32.dll/RegEnumValueW
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: GDI32.dll/GetFontAssocStatus
DynamicLoader: ADVAPI32.dll/RegQueryValueExA
DynamicLoader: ADVAPI32.dll/RegEnumKeyExW
DynamicLoader: GDI32.dll/GetTextFaceAliasW
DynamicLoader: USER32.dll/MonitorFromRect
DynamicLoader: USER32.dll/GetMonitorInfo
DynamicLoader: USER32.dll/GetMonitorInfoW
DynamicLoader: GDI32.dll/CreateDC
DynamicLoader: GDI32.dll/CreateDCW
DynamicLoader: GDI32.dll/GetDeviceCaps
DynamicLoader: GDI32.dll/DeleteDC
DynamicLoader: USER32.dll/GetDoubleClickTime
DynamicLoader: gdiplus.dll/GdipCreateBitmapFromStream
DynamicLoader: WindowsCodecs.dll/DllGetClassObject
DynamicLoader: gdiplus.dll/GdipImageForceValidation
DynamicLoader: gdiplus.dll/GdipGetImageRawFormat
DynamicLoader: gdiplus.dll/GdipGetImageWidth
DynamicLoader: gdiplus.dll/GdipGetImageHeight
DynamicLoader: gdiplus.dll/GdipCreateBitmapFromScan0
DynamicLoader: gdiplus.dll/GdipGetImagePixelFormat
DynamicLoader: gdiplus.dll/GdipGetImageGraphicsContext
DynamicLoader: USER32.dll/GetSysColor
DynamicLoader: USER32.dll/GetSysColorW
DynamicLoader: gdiplus.dll/GdipGraphicsClear
DynamicLoader: gdiplus.dll/GdipCreateImageAttributes
DynamicLoader: gdiplus.dll/GdipSetImageAttributesColorKeys
DynamicLoader: gdiplus.dll/GdipDrawImageRectRectI
DynamicLoader: gdiplus.dll/GdipDisposeImageAttributes
DynamicLoader: gdiplus.dll/GdipDisposeImage
DynamicLoader: KERNEL32.dll/SetErrorMode
DynamicLoader: KERNEL32.dll/GetFileAttributesEx
DynamicLoader: KERNEL32.dll/GetFileAttributesExW
DynamicLoader: culture.dll/ConvertLangIdToCultureName
DynamicLoader: USER32.dll/GetSystemMetrics
DynamicLoader: GDI32.dll/GetDeviceCaps
DynamicLoader: USER32.dll/CreateIconFromResourceEx
DynamicLoader: GDI32.dll/CreateCompatibleDC
DynamicLoader: gdiplus.dll/GdipGetLogFontW
DynamicLoader: MSCOREE.DLL/ND_WU1
DynamicLoader: mscoreei.dll/ND_WU1_RetAddr
DynamicLoader: mscoreei.dll/ND_WU1
DynamicLoader: GDI32.dll/CreateFontIndirect
DynamicLoader: GDI32.dll/CreateFontIndirectW
DynamicLoader: GDI32.dll/SelectObject
DynamicLoader: GDI32.dll/GetTextMetricsW
DynamicLoader: GDI32.dll/GetTextExtentPoint32W
DynamicLoader: USER32.dll/GetCursorPos
DynamicLoader: USER32.dll/MonitorFromPoint
DynamicLoader: gdiplus.dll/GdipLoadImageFromStream
DynamicLoader: gdiplus.dll/GdipGetImageType
DynamicLoader: gdiplus.dll/GdipBitmapGetPixel
DynamicLoader: KERNEL32.dll/GlobalMemoryStatusEx
DynamicLoader: KERNEL32.dll/SwitchToThread
DynamicLoader: KERNEL32.dll/OpenMutex
DynamicLoader: KERNEL32.dll/OpenMutexW
DynamicLoader: KERNEL32.dll/CloseHandle
DynamicLoader: KERNEL32.dll/ReleaseMutex
DynamicLoader: KERNEL32.dll/CreateMutex
DynamicLoader: KERNEL32.dll/CreateMutexW
DynamicLoader: KERNEL32.dll/CreateProcess
DynamicLoader: KERNEL32.dll/CreateProcessW
DynamicLoader: KERNEL32.dll/GetThreadContext
DynamicLoader: KERNEL32.dll/ReadProcessMemory
DynamicLoader: KERNEL32.dll/VirtualAllocEx
DynamicLoader: KERNEL32.dll/WriteProcessMemory
DynamicLoader: KERNEL32.dll/SetThreadContext
DynamicLoader: KERNEL32.dll/ResumeThread
DynamicLoader: ole32.dll/CoWaitForMultipleHandles
DynamicLoader: USER32.dll/SetClassLong
DynamicLoader: USER32.dll/SetClassLongW
DynamicLoader: USER32.dll/PostMessage
DynamicLoader: USER32.dll/PostMessageW
DynamicLoader: USER32.dll/UnregisterClass
DynamicLoader: USER32.dll/UnregisterClassW
DynamicLoader: USER32.dll/IsWindow
DynamicLoader: sechost.dll/LookupAccountNameLocalW
DynamicLoader: KERNEL32.dll/GetProcAddress
DynamicLoader: USER32.dll/DefWindowProcW
DynamicLoader: USER32.dll/SetWindowLong
DynamicLoader: USER32.dll/SetWindowLongW
DynamicLoader: USER32.dll/SetClassLong
DynamicLoader: USER32.dll/SetClassLongW
DynamicLoader: USER32.dll/DestroyWindow
DynamicLoader: USER32.dll/DestroyWindowW
DynamicLoader: USER32.dll/PostMessage
DynamicLoader: USER32.dll/PostMessageW
DynamicLoader: KERNEL32.dll/DeleteAtom
DynamicLoader: KERNEL32.dll/DeleteAtomW
DynamicLoader: GDI32.dll/RestoreDC
DynamicLoader: GDI32.dll/DeleteDC
DynamicLoader: ADVAPI32.dll/LookupAccountSidW
DynamicLoader: sechost.dll/LookupAccountSidLocalW
DynamicLoader: GDI32.dll/DeleteObject
DynamicLoader: USER32.dll/DestroyIcon
DynamicLoader: KERNEL32.dll/CloseHandle
DynamicLoader: CRYPTSP.dll/CryptAcquireContextW
DynamicLoader: CRYPTSP.dll/CryptGenRandom
DynamicLoader: ole32.dll/NdrOleInitializeExtension
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: RpcRtRemote.dll/I_RpcExtInitializeExtensionPoint
DynamicLoader: KERNEL32.dll/CreateActCtxW
DynamicLoader: KERNEL32.dll/AddRefActCtx
DynamicLoader: KERNEL32.dll/ReleaseActCtx
DynamicLoader: KERNEL32.dll/ActivateActCtx
DynamicLoader: KERNEL32.dll/DeactivateActCtx
DynamicLoader: KERNEL32.dll/GetCurrentActCtx
DynamicLoader: KERNEL32.dll/QueryActCtxW
DynamicLoader: CRYPTSP.dll/CryptReleaseContext
DynamicLoader: ADVAPI32.dll/EventUnregister
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryInfoKeyW
DynamicLoader: ADVAPI32.dll/RegEnumKeyExW
DynamicLoader: ADVAPI32.dll/RegEnumValueW
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: KERNEL32.dll/FlsAlloc
DynamicLoader: KERNEL32.dll/FlsFree
DynamicLoader: KERNEL32.dll/FlsGetValue
DynamicLoader: KERNEL32.dll/FlsSetValue
DynamicLoader: KERNEL32.dll/InitializeCriticalSectionEx
DynamicLoader: KERNEL32.dll/CreateEventExW
DynamicLoader: KERNEL32.dll/CreateSemaphoreExW
DynamicLoader: KERNEL32.dll/SetThreadStackGuarantee
DynamicLoader: KERNEL32.dll/CreateThreadpoolTimer
DynamicLoader: KERNEL32.dll/SetThreadpoolTimer
DynamicLoader: KERNEL32.dll/WaitForThreadpoolTimerCallbacks
DynamicLoader: KERNEL32.dll/CloseThreadpoolTimer
DynamicLoader: KERNEL32.dll/CreateThreadpoolWait
DynamicLoader: KERNEL32.dll/SetThreadpoolWait
DynamicLoader: KERNEL32.dll/CloseThreadpoolWait
DynamicLoader: KERNEL32.dll/FlushProcessWriteBuffers
DynamicLoader: KERNEL32.dll/FreeLibraryWhenCallbackReturns
DynamicLoader: KERNEL32.dll/GetCurrentProcessorNumber
DynamicLoader: KERNEL32.dll/GetLogicalProcessorInformation
DynamicLoader: KERNEL32.dll/CreateSymbolicLinkW
DynamicLoader: KERNEL32.dll/SetDefaultDllDirectories
DynamicLoader: KERNEL32.dll/EnumSystemLocalesEx
DynamicLoader: KERNEL32.dll/CompareStringEx
DynamicLoader: KERNEL32.dll/GetDateFormatEx
DynamicLoader: KERNEL32.dll/GetLocaleInfoEx
DynamicLoader: KERNEL32.dll/GetTimeFormatEx
DynamicLoader: KERNEL32.dll/GetUserDefaultLocaleName
DynamicLoader: KERNEL32.dll/IsValidLocaleName
DynamicLoader: KERNEL32.dll/LCMapStringEx
DynamicLoader: KERNEL32.dll/GetCurrentPackageId
DynamicLoader: KERNEL32.dll/GetTickCount64
DynamicLoader: KERNEL32.dll/GetFileInformationByHandleExW
DynamicLoader: KERNEL32.dll/SetFileInformationByHandleW
DynamicLoader: KERNEL32.dll/AcquireSRWLockExclusive
DynamicLoader: KERNEL32.dll/ReleaseSRWLockExclusive
DynamicLoader: ADVAPI32.dll/EventRegister
DynamicLoader: ADVAPI32.dll/EventSetInformation
DynamicLoader: MSCOREE.DLL/
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: mscoreei.dll/RegisterShimImplCallback
DynamicLoader: mscoreei.dll/RegisterShimImplCleanupCallback
DynamicLoader: mscoreei.dll/SetShellShimInstance
DynamicLoader: mscoreei.dll/OnShimDllMainCalled
DynamicLoader: mscoreei.dll/_CorExeMain_RetAddr
DynamicLoader: mscoreei.dll/_CorExeMain
DynamicLoader: SHLWAPI.dll/UrlIsW
DynamicLoader: VERSION.dll/GetFileVersionInfoSizeW
DynamicLoader: VERSION.dll/GetFileVersionInfoW
DynamicLoader: VERSION.dll/VerQueryValueW
DynamicLoader: KERNEL32.dll/FlsAlloc
DynamicLoader: KERNEL32.dll/FlsGetValue
DynamicLoader: KERNEL32.dll/FlsSetValue
DynamicLoader: KERNEL32.dll/FlsFree
DynamicLoader: KERNEL32.dll/InitializeCriticalSectionAndSpinCount
DynamicLoader: KERNEL32.dll/IsProcessorFeaturePresent
DynamicLoader: msvcrt.dll/_set_error_mode
DynamicLoader: msvcrt.dll/[email protected]@[email protected]
DynamicLoader: msvcrt.dll/_get_terminate
DynamicLoader: KERNEL32.dll/FindActCtxSectionStringW
DynamicLoader: KERNEL32.dll/GetSystemWindowsDirectoryW
DynamicLoader: MSCOREE.DLL/GetProcessExecutableHeap
DynamicLoader: mscoreei.dll/GetProcessExecutableHeap_RetAddr
DynamicLoader: mscoreei.dll/GetProcessExecutableHeap
DynamicLoader: mscorwks.dll/SetLoadedByMscoree
DynamicLoader: USER32.dll/GetProcessWindowStation
DynamicLoader: USER32.dll/GetUserObjectInformationW
DynamicLoader: mscorwks.dll/_CorExeMain
DynamicLoader: mscorwks.dll/GetCLRFunction
DynamicLoader: ADVAPI32.dll/RegisterTraceGuidsW
DynamicLoader: ADVAPI32.dll/UnregisterTraceGuids
DynamicLoader: ADVAPI32.dll/GetTraceLoggerHandle
DynamicLoader: ADVAPI32.dll/GetTraceEnableLevel
DynamicLoader: ADVAPI32.dll/GetTraceEnableFlags
DynamicLoader: ADVAPI32.dll/TraceEvent
DynamicLoader: MSCOREE.DLL/IEE
DynamicLoader: mscoreei.dll/IEE_RetAddr
DynamicLoader: mscoreei.dll/IEE
DynamicLoader: mscorwks.dll/IEE
DynamicLoader: MSCOREE.DLL/GetStartupFlags
DynamicLoader: mscoreei.dll/GetStartupFlags_RetAddr
DynamicLoader: mscoreei.dll/GetStartupFlags
DynamicLoader: MSCOREE.DLL/GetHostConfigurationFile
DynamicLoader: mscoreei.dll/GetHostConfigurationFile_RetAddr
DynamicLoader: mscoreei.dll/GetHostConfigurationFile
DynamicLoader: mscoreei.dll/GetCORVersion_RetAddr
DynamicLoader: mscoreei.dll/GetCORVersion
DynamicLoader: MSCOREE.DLL/GetCORSystemDirectory
DynamicLoader: mscoreei.dll/GetCORSystemDirectory_RetAddr
DynamicLoader: mscoreei.dll/CreateConfigStream_RetAddr
DynamicLoader: mscoreei.dll/CreateConfigStream
DynamicLoader: ntdll.dll/RtlUnwind
DynamicLoader: KERNEL32.dll/IsWow64Process
DynamicLoader: KERNEL32.dll/GetSystemWindowsDirectoryW
DynamicLoader: ADVAPI32.dll/AllocateAndInitializeSid
DynamicLoader: ADVAPI32.dll/OpenProcessToken
DynamicLoader: ADVAPI32.dll/GetTokenInformation
DynamicLoader: ADVAPI32.dll/InitializeAcl
DynamicLoader: ADVAPI32.dll/AddAccessAllowedAce
DynamicLoader: ADVAPI32.dll/FreeSid
DynamicLoader: ADVAPI32.dll/AllocateAndInitializeSid
DynamicLoader: ADVAPI32.dll/OpenProcessToken
DynamicLoader: ADVAPI32.dll/GetTokenInformation
DynamicLoader: ADVAPI32.dll/InitializeAcl
DynamicLoader: ADVAPI32.dll/AddAccessAllowedAce
DynamicLoader: ADVAPI32.dll/FreeSid
DynamicLoader: KERNEL32.dll/SetThreadStackGuarantee
DynamicLoader: KERNEL32.dll/FlsSetValue
DynamicLoader: KERNEL32.dll/FlsGetValue
DynamicLoader: KERNEL32.dll/FlsAlloc
DynamicLoader: KERNEL32.dll/FlsFree
DynamicLoader: KERNEL32.dll/AddVectoredContinueHandler
DynamicLoader: KERNEL32.dll/RemoveVectoredContinueHandler
DynamicLoader: ADVAPI32.dll/ConvertSidToStringSidW
DynamicLoader: shell32.dll/SHGetFolderPathW
DynamicLoader: KERNEL32.dll/FlushProcessWriteBuffers
DynamicLoader: KERNEL32.dll/GetWriteWatch
DynamicLoader: KERNEL32.dll/ResetWriteWatch
DynamicLoader: KERNEL32.dll/CreateMemoryResourceNotification
DynamicLoader: KERNEL32.dll/QueryMemoryResourceNotification
DynamicLoader: ole32.dll/CoInitializeEx
DynamicLoader: CRYPTBASE.dll/SystemFunction036
DynamicLoader: KERNEL32.dll/QueryActCtxW
DynamicLoader: ole32.dll/CoGetContextToken
DynamicLoader: KERNEL32.dll/GetFullPathName
DynamicLoader: KERNEL32.dll/GetFullPathNameW
DynamicLoader: KERNEL32.dll/GetVersionEx
DynamicLoader: KERNEL32.dll/GetVersionExW
DynamicLoader: KERNEL32.dll/GetVersionEx
DynamicLoader: KERNEL32.dll/GetVersionExW
DynamicLoader: ADVAPI32.dll/CryptAcquireContextA
DynamicLoader: ADVAPI32.dll/CryptReleaseContext
DynamicLoader: ADVAPI32.dll/CryptCreateHash
DynamicLoader: ADVAPI32.dll/CryptDestroyHash
DynamicLoader: ADVAPI32.dll/CryptHashData
DynamicLoader: ADVAPI32.dll/CryptGetHashParam
DynamicLoader: ADVAPI32.dll/CryptImportKey
DynamicLoader: ADVAPI32.dll/CryptExportKey
DynamicLoader: ADVAPI32.dll/CryptGenKey
DynamicLoader: ADVAPI32.dll/CryptGetKeyParam
DynamicLoader: ADVAPI32.dll/CryptDestroyKey
DynamicLoader: ADVAPI32.dll/CryptVerifySignatureA
DynamicLoader: ADVAPI32.dll/CryptSignHashA
DynamicLoader: ADVAPI32.dll/CryptGetProvParam
DynamicLoader: ADVAPI32.dll/CryptGetUserKey
DynamicLoader: ADVAPI32.dll/CryptEnumProvidersA
DynamicLoader: MSCOREE.DLL/GetMetaDataInternalInterface
DynamicLoader: mscoreei.dll/GetMetaDataInternalInterface_RetAddr
DynamicLoader: mscoreei.dll/GetMetaDataInternalInterface
DynamicLoader: mscorwks.dll/GetMetaDataInternalInterface
DynamicLoader: mscorjit.dll/getJit
DynamicLoader: KERNEL32.dll/IsWow64Process
DynamicLoader: KERNEL32.dll/GetUserDefaultUILanguage
DynamicLoader: KERNEL32.dll/SetErrorMode
DynamicLoader: KERNEL32.dll/GetFileAttributesEx
DynamicLoader: KERNEL32.dll/GetFileAttributesExW
DynamicLoader: bcrypt.dll/BCryptGetFipsAlgorithmMode
DynamicLoader: KERNEL32.dll/lstrlen
DynamicLoader: KERNEL32.dll/lstrlenW
DynamicLoader: KERNEL32.dll/GetModuleHandle
DynamicLoader: KERNEL32.dll/GetModuleHandleW
DynamicLoader: KERNEL32.dll/GetProcAddress
DynamicLoader: USER32.dll/DefWindowProcW
DynamicLoader: GDI32.dll/GetStockObject
DynamicLoader: USER32.dll/RegisterClass
DynamicLoader: USER32.dll/RegisterClassW
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: USER32.dll/CreateWindowEx
DynamicLoader: USER32.dll/CreateWindowExW
DynamicLoader: USER32.dll/SetWindowLong
DynamicLoader: USER32.dll/SetWindowLongW
DynamicLoader: USER32.dll/GetWindowLong
DynamicLoader: USER32.dll/GetWindowLongW
DynamicLoader: KERNEL32.dll/GetCurrentProcess
DynamicLoader: KERNEL32.dll/GetCurrentThread
DynamicLoader: KERNEL32.dll/DuplicateHandle
DynamicLoader: KERNEL32.dll/GetCurrentThreadId
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: ADVAPI32.dll/RegOpenKeyEx
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryValueEx
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: USER32.dll/SetWindowLong
DynamicLoader: USER32.dll/SetWindowLongW
DynamicLoader: USER32.dll/CallWindowProc
DynamicLoader: USER32.dll/CallWindowProcW
DynamicLoader: USER32.dll/RegisterWindowMessage
DynamicLoader: USER32.dll/RegisterWindowMessageW
DynamicLoader: CRYPTSP.dll/CryptAcquireContextW
DynamicLoader: CRYPTSP.dll/CryptCreateHash
DynamicLoader: ole32.dll/CreateBindCtx
DynamicLoader: ole32.dll/CoGetObjectContext
DynamicLoader: sechost.dll/LookupAccountNameLocalW
DynamicLoader: ADVAPI32.dll/LookupAccountSidW
DynamicLoader: sechost.dll/LookupAccountSidLocalW
DynamicLoader: CRYPTSP.dll/CryptAcquireContextW
DynamicLoader: CRYPTSP.dll/CryptGenRandom
DynamicLoader: ole32.dll/NdrOleInitializeExtension
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: RpcRtRemote.dll/I_RpcExtInitializeExtensionPoint
DynamicLoader: ole32.dll/MkParseDisplayName
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: KERNEL32.dll/CreateEvent
DynamicLoader: KERNEL32.dll/CreateEventW
DynamicLoader: KERNEL32.dll/CloseHandle
DynamicLoader: KERNEL32.dll/SwitchToThread
DynamicLoader: KERNEL32.dll/SetEvent
DynamicLoader: ole32.dll/CoWaitForMultipleHandles
DynamicLoader: ole32.dll/IIDFromString
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: KERNEL32.dll/LoadLibrary
DynamicLoader: KERNEL32.dll/LoadLibraryA
DynamicLoader: KERNEL32.dll/GetProcAddress
DynamicLoader: wminet_utils.dll/ResetSecurity
DynamicLoader: wminet_utils.dll/SetSecurity
DynamicLoader: wminet_utils.dll/BlessIWbemServices
DynamicLoader: wminet_utils.dll/BlessIWbemServicesObject
DynamicLoader: wminet_utils.dll/GetPropertyHandle
DynamicLoader: wminet_utils.dll/WritePropertyValue
DynamicLoader: wminet_utils.dll/Clone
DynamicLoader: wminet_utils.dll/VerifyClientKey
DynamicLoader: wminet_utils.dll/GetQualifierSet
DynamicLoader: wminet_utils.dll/Get
DynamicLoader: wminet_utils.dll/Put
DynamicLoader: wminet_utils.dll/Delete
DynamicLoader: wminet_utils.dll/GetNames
DynamicLoader: wminet_utils.dll/BeginEnumeration
DynamicLoader: wminet_utils.dll/Next
DynamicLoader: wminet_utils.dll/EndEnumeration
DynamicLoader: wminet_utils.dll/GetPropertyQualifierSet
DynamicLoader: wminet_utils.dll/Clone
DynamicLoader: wminet_utils.dll/GetObjectText
DynamicLoader: wminet_utils.dll/SpawnDerivedClass
DynamicLoader: wminet_utils.dll/SpawnInstance
DynamicLoader: wminet_utils.dll/CompareTo
DynamicLoader: wminet_utils.dll/GetPropertyOrigin
DynamicLoader: wminet_utils.dll/InheritsFrom
DynamicLoader: wminet_utils.dll/GetMethod
DynamicLoader: wminet_utils.dll/PutMethod
DynamicLoader: wminet_utils.dll/DeleteMethod
DynamicLoader: wminet_utils.dll/BeginMethodEnumeration
DynamicLoader: wminet_utils.dll/NextMethod
DynamicLoader: wminet_utils.dll/EndMethodEnumeration
DynamicLoader: wminet_utils.dll/GetMethodQualifierSet
DynamicLoader: wminet_utils.dll/GetMethodOrigin
DynamicLoader: wminet_utils.dll/QualifierSet_Get
DynamicLoader: wminet_utils.dll/QualifierSet_Put
DynamicLoader: wminet_utils.dll/QualifierSet_Delete
DynamicLoader: wminet_utils.dll/QualifierSet_GetNames
DynamicLoader: wminet_utils.dll/QualifierSet_BeginEnumeration
DynamicLoader: wminet_utils.dll/QualifierSet_Next
DynamicLoader: wminet_utils.dll/QualifierSet_EndEnumeration
DynamicLoader: wminet_utils.dll/GetCurrentApartmentType
DynamicLoader: wminet_utils.dll/GetDemultiplexedStub
DynamicLoader: wminet_utils.dll/CreateInstanceEnumWmi
DynamicLoader: wminet_utils.dll/CreateClassEnumWmi
DynamicLoader: wminet_utils.dll/ExecQueryWmi
DynamicLoader: wminet_utils.dll/ExecNotificationQueryWmi
DynamicLoader: wminet_utils.dll/PutInstanceWmi
DynamicLoader: wminet_utils.dll/PutClassWmi
DynamicLoader: wminet_utils.dll/CloneEnumWbemClassObject
DynamicLoader: wminet_utils.dll/ConnectServerWmi
DynamicLoader: wminet_utils.dll/GetErrorInfo
DynamicLoader: wminet_utils.dll/Initialize
DynamicLoader: OLEAUT32.dll/SysStringLen
DynamicLoader: KERNEL32.dll/ZeroMemory
DynamicLoader: KERNEL32.dll/ZeroMemoryA
DynamicLoader: KERNEL32.dll/RtlZeroMemory
DynamicLoader: ole32.dll/CoUninitialize
DynamicLoader: OLEAUT32.dll/
DynamicLoader: ADVAPI32.dll/GetUserName
DynamicLoader: ADVAPI32.dll/GetUserNameW
DynamicLoader: KERNEL32.dll/GetComputerName
DynamicLoader: KERNEL32.dll/GetComputerNameW
DynamicLoader: KERNEL32.dll/GetEnvironmentVariable
DynamicLoader: KERNEL32.dll/GetEnvironmentVariableW
DynamicLoader: KERNEL32.dll/GetCurrentProcessId
DynamicLoader: KERNEL32.dll/GetCurrentProcessIdW
DynamicLoader: ADVAPI32.dll/LookupPrivilegeValue
DynamicLoader: ADVAPI32.dll/LookupPrivilegeValueW
DynamicLoader: KERNEL32.dll/GetCurrentProcess
DynamicLoader: ADVAPI32.dll/OpenProcessToken
DynamicLoader: ADVAPI32.dll/OpenProcessTokenW
DynamicLoader: ADVAPI32.dll/AdjustTokenPrivileges
DynamicLoader: ADVAPI32.dll/AdjustTokenPrivilegesW
DynamicLoader: KERNEL32.dll/CloseHandle
DynamicLoader: ntdll.dll/NtQuerySystemInformation
DynamicLoader: ntdll.dll/NtQuerySystemInformationW
DynamicLoader: KERNEL32.dll/CreateDirectory
DynamicLoader: KERNEL32.dll/CreateDirectoryW
DynamicLoader: KERNEL32.dll/CopyFile
DynamicLoader: KERNEL32.dll/CopyFileW
DynamicLoader: ADVAPI32.dll/RegSetValueEx
DynamicLoader: ADVAPI32.dll/RegSetValueExW
DynamicLoader: KERNEL32.dll/DeleteFile
DynamicLoader: KERNEL32.dll/DeleteFileW
DynamicLoader: USER32.dll/GetProcessWindowStation
DynamicLoader: USER32.dll/GetUserObjectInformation
DynamicLoader: USER32.dll/GetUserObjectInformationA
DynamicLoader: USER32.dll/GetActiveWindow
DynamicLoader: ole32.dll/OleInitialize
DynamicLoader: ole32.dll/CoRegisterMessageFilter
DynamicLoader: USER32.dll/EnumThreadWindows
DynamicLoader: USER32.dll/IsWindowVisible
DynamicLoader: USER32.dll/GetFocus
DynamicLoader: USER32.dll/MessageBox
DynamicLoader: USER32.dll/MessageBoxW
DynamicLoader: GDI32.dll/GetLayout
DynamicLoader: GDI32.dll/GdiRealizationInfo
DynamicLoader: GDI32.dll/FontIsLinked
DynamicLoader: ADVAPI32.dll/RegOpenKeyExW
DynamicLoader: ADVAPI32.dll/RegQueryInfoKeyW
DynamicLoader: GDI32.dll/GetTextFaceAliasW
DynamicLoader: ADVAPI32.dll/RegEnumValueW
DynamicLoader: ADVAPI32.dll/RegCloseKey
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: ADVAPI32.dll/RegQueryValueExW
DynamicLoader: GDI32.dll/GetFontAssocStatus
DynamicLoader: ADVAPI32.dll/RegQueryValueExA
DynamicLoader: ADVAPI32.dll/RegEnumKeyExW
DynamicLoader: GDI32.dll/GetTextFaceAliasW
DynamicLoader: ole32.dll/CoInitializeEx
DynamicLoader: ole32.dll/CoUninitialize
DynamicLoader: ole32.dll/CoRegisterInitializeSpy
DynamicLoader: ole32.dll/CoRevokeInitializeSpy
DynamicLoader: GDI32.dll/GdiIsMetaPrintDC
DynamicLoader: USER32.dll/SendMessage
DynamicLoader: USER32.dll/SendMessageW
DynamicLoader: KERNEL32.dll/CreateIoCompletionPort
DynamicLoader: KERNEL32.dll/PostQueuedCompletionStatus
DynamicLoader: ntdll.dll/NtQueryInformationThread
DynamicLoader: ntdll.dll/NtQuerySystemInformation
DynamicLoader: ntdll.dll/NtGetCurrentProcessorNumber
DynamicLoader: ole32.dll/CoCreateGuid
DynamicLoader: shfolder.dll/SHGetFolderPath
DynamicLoader: shfolder.dll/SHGetFolderPathW
DynamicLoader: KERNEL32.dll/FindFirstFile
DynamicLoader: KERNEL32.dll/FindFirstFileW
DynamicLoader: KERNEL32.dll/FindClose
DynamicLoader: KERNEL32.dll/FindNextFile
DynamicLoader: KERNEL32.dll/FindNextFileW
DynamicLoader: KERNEL32.dll/CreateFile
DynamicLoader: KERNEL32.dll/CreateFileW
DynamicLoader: KERNEL32.dll/GetFileType
DynamicLoader: KERNEL32.dll/GetFileSize
DynamicLoader: KERNEL32.dll/ReadFile
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: KERNEL32.dll/GetACP
DynamicLoader: KERNEL32.dll/UnmapViewOfFile
DynamicLoader: KERNEL32.dll/GetSystemTimeAsFileTime
DynamicLoader: USER32.dll/GetLastInputInfo
DynamicLoader: KERNEL32.dll/LocalFree
DynamicLoader: KERNEL32.dll/ZeroMemory
DynamicLoader: KERNEL32.dll/ZeroMemoryA
DynamicLoader: KERNEL32.dll/RtlZeroMemory
DynamicLoader: crypt32.dll/CryptUnprotectData
DynamicLoader: crypt32.dll/CryptUnprotectDataW
DynamicLoader: RPCRT4.dll/RpcStringBindingComposeW
DynamicLoader: RPCRT4.dll/RpcBindingFromStringBindingW
DynamicLoader: RPCRT4.dll/NdrClientCall2
DynamicLoader: CRYPTBASE.dll/SystemFunction041
DynamicLoader: RPCRT4.dll/RpcStringFreeW
DynamicLoader: RPCRT4.dll/RpcBindingFree
DynamicLoader: CRYPTSP.dll/CryptHashData
DynamicLoader: CRYPTSP.dll/CryptGetHashParam
DynamicLoader: CRYPTSP.dll/CryptDestroyHash
DynamicLoader: vaultcli.dll/VaultEnumerateVaults
DynamicLoader: USER32.dll/GetSystemMetrics
DynamicLoader: USER32.dll/GetDC
DynamicLoader: USER32.dll/EnumDisplayMonitors
DynamicLoader: USER32.dll/GetMonitorInfo
DynamicLoader: USER32.dll/GetMonitorInfoW
DynamicLoader: GDI32.dll/GetDeviceCaps
DynamicLoader: USER32.dll/ReleaseDC
DynamicLoader: USER32.dll/GetProcessWindowStation
DynamicLoader: USER32.dll/GetUserObjectInformation
DynamicLoader: USER32.dll/GetUserObjectInformationA
DynamicLoader: KERNEL32.dll/SetConsoleCtrlHandler
DynamicLoader: KERNEL32.dll/SetConsoleCtrlHandlerW
DynamicLoader: KERNEL32.dll/GetModuleHandle
DynamicLoader: KERNEL32.dll/GetModuleHandleW
DynamicLoader: USER32.dll/GetClassInfo
DynamicLoader: USER32.dll/GetClassInfoW
DynamicLoader: USER32.dll/RegisterClass
DynamicLoader: USER32.dll/RegisterClassW
DynamicLoader: USER32.dll/CreateWindowEx
DynamicLoader: USER32.dll/CreateWindowExW
DynamicLoader: USER32.dll/DefWindowProc
DynamicLoader: USER32.dll/DefWindowProcW
DynamicLoader: USER32.dll/MsgWaitForMultipleObjectsEx
DynamicLoader: KERNEL32.dll/GetCurrentProcessId
DynamicLoader: KERNEL32.dll/GetCurrentProcessIdW
DynamicLoader: KERNEL32.dll/FindAtom
DynamicLoader: KERNEL32.dll/FindAtomW
DynamicLoader: KERNEL32.dll/AddAtom
DynamicLoader: KERNEL32.dll/AddAtomW
DynamicLoader: MSCOREE.DLL/LoadLibraryShim
DynamicLoader: mscoreei.dll/LoadLibraryShim_RetAddr
DynamicLoader: mscoreei.dll/LoadLibraryShim
DynamicLoader: gdiplus.dll/GdiplusStartup
DynamicLoader: KERNEL32.dll/IsProcessorFeaturePresent
DynamicLoader: USER32.dll/GetWindowInfo
DynamicLoader: USER32.dll/GetAncestor
DynamicLoader: USER32.dll/GetMonitorInfoA
DynamicLoader: USER32.dll/EnumDisplayMonitors
DynamicLoader: USER32.dll/EnumDisplayDevicesA
DynamicLoader: GDI32.dll/ExtTextOutW
DynamicLoader: GDI32.dll/GdiIsMetaPrintDC
DynamicLoader: gdiplus.dll/GdipCreateBitmapFromScan0
DynamicLoader: gdiplus.dll/GdipGetImageEncodersSize
DynamicLoader: KERNEL32.dll/LocalAlloc
DynamicLoader: gdiplus.dll/GdipGetImageEncoders
DynamicLoader: KERNEL32.dll/lstrlenW
DynamicLoader: KERNEL32.dll/lstrlenWW
DynamicLoader: KERNEL32.dll/RtlMoveMemory
DynamicLoader: KERNEL32.dll/RtlMoveMemoryW
DynamicLoader: KERNEL32.dll/LocalFree
DynamicLoader: MSCOREE.DLL/ND_WI4
DynamicLoader: mscoreei.dll/ND_WI4_RetAddr
DynamicLoader: mscoreei.dll/ND_WI4
DynamicLoader: gdiplus.dll/GdipGetImagePixelFormat
DynamicLoader: gdiplus.dll/GdipGetImageGraphicsContext
DynamicLoader: USER32.dll/GetDC
DynamicLoader: GDI32.dll/GetCurrentObject
DynamicLoader: culture.dll/ConvertLangIdToCultureName
DynamicLoader: gdiplus.dll/GdipGetDC
DynamicLoader: GDI32.dll/BitBlt
DynamicLoader: gdiplus.dll/GdipReleaseDC
DynamicLoader: USER32.dll/ReleaseDC
DynamicLoader: gdiplus.dll/GdipSaveImageToStream
DynamicLoader: WindowsCodecs.dll/DllGetClassObject
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: ole32.dll/CoGetObjectContext
DynamicLoader: ole32.dll/CLSIDFromProgIDEx
DynamicLoader: sxs.dll/SxsLookupClrGuid
DynamicLoader: KERNEL32.dll/ReleaseActCtx
DynamicLoader: sxs.dll/SxsOleAut32RedirectTypeLibrary
DynamicLoader: ADVAPI32.dll/RegOpenKeyW
DynamicLoader: ADVAPI32.dll/RegQueryValueW
DynamicLoader: sxs.dll/SxsOleAut32MapConfiguredClsidToReferenceClsid
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: USER32.dll/SetClipboardViewer
DynamicLoader: USER32.dll/SetClipboardViewerW
DynamicLoader: ole32.dll/OleGetClipboard
DynamicLoader: KERNEL32.dll/GlobalLock
DynamicLoader: KERNEL32.dll/GlobalUnlock
DynamicLoader: KERNEL32.dll/GlobalFree
DynamicLoader: USER32.dll/SendMessage
DynamicLoader: USER32.dll/SendMessageW
DynamicLoader: USER32.dll/SetWindowsHookEx
DynamicLoader: USER32.dll/SetWindowsHookExW
DynamicLoader: USER32.dll/GetClientRect
DynamicLoader: USER32.dll/GetWindowRect
DynamicLoader: USER32.dll/GetParent
DynamicLoader: USER32.dll/PeekMessage
DynamicLoader: USER32.dll/PeekMessageW
DynamicLoader: USER32.dll/IsWindowUnicode
DynamicLoader: USER32.dll/GetMessageW
DynamicLoader: USER32.dll/TranslateMessage
DynamicLoader: USER32.dll/DispatchMessageW
DynamicLoader: USER32.dll/WaitMessage
DynamicLoader: KERNEL32.dll/GetTempPath
DynamicLoader: KERNEL32.dll/GetTempPathW
DynamicLoader: KERNEL32.dll/SetFilePointer
DynamicLoader: KERNEL32.dll/WriteFile
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: kernel32.dll/ResolveDelayLoadedAPI
DynamicLoader: VSSAPI.DLL/CreateWriter
DynamicLoader: OLEAUT32.dll/
DynamicLoader: OLEAUT32.dll/
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ADVAPI32.dll/LookupAccountNameW
DynamicLoader: sechost.dll/LookupAccountNameLocalW
DynamicLoader: ADVAPI32.dll/LookupAccountSidW
DynamicLoader: samcli.dll/NetLocalGroupGetMembers
DynamicLoader: SAMLIB.dll/SamConnect
DynamicLoader: RPCRT4.dll/NdrClientCall3
DynamicLoader: RPCRT4.dll/RpcStringBindingComposeW
DynamicLoader: RPCRT4.dll/RpcBindingFromStringBindingW
DynamicLoader: RPCRT4.dll/RpcStringFreeW
DynamicLoader: RPCRT4.dll/RpcBindingFree
DynamicLoader: SAMLIB.dll/SamOpenDomain
DynamicLoader: SAMLIB.dll/SamLookupNamesInDomain
DynamicLoader: SAMLIB.dll/SamOpenAlias
DynamicLoader: SAMLIB.dll/SamFreeMemory
DynamicLoader: SAMLIB.dll/SamCloseHandle
DynamicLoader: SAMLIB.dll/SamGetMembersInAlias
DynamicLoader: netutils.dll/NetApiBufferFree
DynamicLoader: SAMLIB.dll/SamEnumerateDomainsInSamServer
DynamicLoader: SAMLIB.dll/SamLookupDomainInSamServer
DynamicLoader: ole32.dll/CoCreateGuid
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: sechost.dll/ConvertSidToStringSidW
DynamicLoader: ole32.dll/CoTaskMemRealloc
DynamicLoader: ADVAPI32.dll/RegisterEventSourceW
DynamicLoader: ADVAPI32.dll/ReportEventW
DynamicLoader: ADVAPI32.dll/DeregisterEventSource
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: ole32.dll/CoGetClassObject
DynamicLoader: ole32.dll/CoGetMarshalSizeMax
DynamicLoader: ole32.dll/CoMarshalInterface
DynamicLoader: ole32.dll/CoUnmarshalInterface
DynamicLoader: ole32.dll/StringFromIID
DynamicLoader: ole32.dll/CoGetPSClsid
DynamicLoader: ole32.dll/CoTaskMemAlloc
DynamicLoader: ole32.dll/CoTaskMemFree
DynamicLoader: ole32.dll/CoCreateInstance
DynamicLoader: ole32.dll/CoReleaseMarshalData
DynamicLoader: ole32.dll/DcomChannelSetHResult
DynamicLoader: CRYPTBASE.dll/SystemFunction036
DynamicLoader: ole32.dll/CLSIDFromOle1Class
DynamicLoader: CLBCatQ.DLL/GetCatalogObject
DynamicLoader: CLBCatQ.DLL/GetCatalogObject2
DynamicLoader: sechost.dll/LookupAccountNameLocalW
DynamicLoader: ADVAPI32.dll/LookupAccountSidW
DynamicLoader: sechost.dll/LookupAccountSidLocalW
DynamicLoader: OLEAUT32.dll/
DynamicLoader: CRYPTBASE.dll/SystemFunction036
DynamicLoader: ole32.dll/CLSIDFromOle1Class
DynamicLoader: CLBCatQ.DLL/GetCatalogObject
DynamicLoader: CLBCatQ.DLL/GetCatalogObject2
DynamicLoader: sechost.dll/LookupAccountNameLocalW
DynamicLoader: ADVAPI32.dll/LookupAccountSidW
DynamicLoader: sechost.dll/LookupAccountSidLocalW
DynamicLoader: OLEAUT32.dll/
CAPE extracted potentially suspicious content
zbuFITgIccG.exe: AgentTeslaV2 Payload: 32-bit executable
zbuFITgIccG.exe: AgentTeslaV2
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Injected Shellcode/Data
zbuFITgIccG.exe: Injected Shellcode/Data
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
zbuFITgIccG.exe: Unpacked Shellcode
Queries or connects to DNS-Over-HTTPS/DNS-Over-TLS domain or IP address
ip: 1.1.1.1
The binary likely contains encrypted or compressed data.
section: name: .text, entropy: 7.85, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x0006f600, virtual_size: 0x0006f43c
Authenticode signature is invalid
authenticode error: No signature found. SignTool Error File not valid C\Users\Louise\AppData\Local\Temp\zbuFITgIccG
Behavioural detection: Injection (Process Hollowing)
Injection: zbuFITgIccG.exe(1372) -> zbuFITgIccG.exe(3576)
Executed a process and injected code into it, probably while unpacking
Injection: zbuFITgIccG.exe(1372) -> zbuFITgIccG.exe(3576)
Attempts to remove evidence of file being downloaded from the Internet
file: C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe:Zone.Identifier
Sniffs keystrokes
SetWindowsHookExW: Process: zbuFITgIccG.exe(3576)
Behavioural detection: Injection (inter-process)
Behavioural detection: Injection with CreateRemoteThread in a remote process
Attempts to repeatedly call a single API many times in order to delay analysis time
Spam: zbuFITgIccG.exe (3576) called API NtYieldExecution 45999 times
Spam: services.exe (472) called API GetSystemTimeAsFileTime 1843602 times
Steals private information from local Internet browsers
file: C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\profiles.ini
file: C:\Users\Louise\AppData\Local\Google\Chrome\User Data\Default\Login Data
file: C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\Profiles\0f9yudun.default\key4.db
Installs itself for autorun at Windows startup
key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\QHqFoFvd
data: C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe
Network activity detected but not expressed in API logs
CAPE detected the AgentTeslaV2 malware family
File has been identified by 12 Antiviruses on VirusTotal as malicious
FireEye: Generic.mg.18e77defd5d83d42
Sangfor: Malware
Cybereason: malicious.146802
BitDefenderTheta: Gen:[email protected]!T2ym
APEX: Malicious
Kaspersky: UDS:DangerousObject.Multi.Generic
Endgame: malicious (high confidence)
eGambit: Unsafe.AI_Score_99%
ZoneAlarm: UDS:DangerousObject.Multi.Generic
Microsoft: Trojan:Win32/Sonbokli.A!cl
Malwarebytes: Spyware.AgentTesla
MaxSecure: Trojan.Malware.300983.susgen
Creates a copy of itself
copy: C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe
Harvests credentials from local FTP client softwares
file: C:\Users\Louise\AppData\Roaming\FileZilla\recentservers.xml
file: C:\Users\Louise\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\*.xml
file: C:\Users\Louise\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
file: C:\Users\Louise\AppData\Roaming\FTPGetter\servers.xml
file: C:\Users\Louise\AppData\Roaming\Ipswitch\WS_FTP\Sites\ws_ftp.ini
file: C:\cftp\Ftplist.txt
key: HKEY_CURRENT_USER\Software\FTPWare\COREFTP\Sites
Harvests information related to installed mail clients
file: C:\Users\Louise\AppData\Roaming\Thunderbird\profiles.ini
key: HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
key: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
key: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
key: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676

Screenshots


Hosts

Direct IP Country Name
Y 8.8.8.8 [VT] United States
Y 1.1.1.1 [VT] Australia

DNS

No domains contacted.


Summary

C:\Windows\System32\MSCOREE.DLL.local
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
C:\Windows\Microsoft.NET\Framework\*
C:\Windows\Microsoft.NET\Framework\v1.0.3705\clr.dll
C:\Windows\Microsoft.NET\Framework\v1.0.3705\mscorwks.dll
C:\Windows\Microsoft.NET\Framework\v1.1.4322\clr.dll
C:\Windows\Microsoft.NET\Framework\v1.1.4322\mscorwks.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\clr.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll
C:\Windows\Microsoft.NET\Framework\v4.0.30319\clr.dll
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe.config
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe
C:\Windows\System32\api-ms-win-appmodel-runtime-l1-1-2.dll
C:\Windows\System32\api-ms-win-appmodel-runtime-l1-1-0.dll
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe.Local\
C:\Windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a
C:\Windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\msvcr80.dll
C:\Windows
C:\Windows\winsxs
C:\Windows\Microsoft.NET\Framework\v4.0.30319
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\machine.config
C:\Windows\Microsoft.NET\Framework\v2.0.50727\fusion.localgac
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch
C:\Users\Louise\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config
C:\Users\Louise\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch
C:\Windows\assembly\NativeImages_v2.0.50727_32\index39c.dat
C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\f8420d8c6ede777377fcff48a4beaa2a\mscorlib.ni.dll
C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
C:\Users
C:\Users\Louise
C:\Users\Louise\AppData
C:\Users\Louise\AppData\Local
C:\Users\Louise\AppData\Local\Temp
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ole32.dll
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.config
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.INI
C:\Windows\System32\l_intl.nls
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorjit.dll
C:\Windows\assembly\pubpol214.dat
C:\Windows\assembly\GAC\PublisherPolicy.tme
C:\Windows\assembly\NativeImages_v2.0.50727_32\System\0a65164b17e5c64bacdc694ea2439c43\System.ni.dll
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\175df210b784212def386595c25caefb\System.Drawing.ni.dll
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\5669120680b52abf616f3876387ca2cc\System.Windows.Forms.ni.dll
C:\Windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.INI
C:\Windows\assembly\GAC_MSIL\System.Drawing\2.0.0.0__b03f5f7f11d50a3a\System.Drawing.INI
C:\Windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\uxtheme.dll
C:\Windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.dll
C:\Windows\Globalization\en-us.nlp
C:\Windows\Microsoft.NET\Framework\v2.0.50727\Gdiplus.dll
C:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.24308_none_5c028e37a0121035
C:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.24308_none_5c028e37a0121035\GdiPlus.dll
C:\Users\Louise\AppData\Local\GDIPFONTCACHEV1.DAT
C:\Windows\Fonts\marlett.ttf
C:\Windows\Fonts\arial.ttf
C:\Windows\Fonts\ariali.ttf
C:\Windows\Fonts\arialbd.ttf
C:\Windows\Fonts\arialbi.ttf
C:\Windows\Fonts\batang.ttc
C:\Windows\Fonts\cour.ttf
C:\Windows\Fonts\couri.ttf
C:\Windows\Fonts\courbd.ttf
C:\Windows\Fonts\courbi.ttf
C:\Windows\Fonts\daunpenh.ttf
C:\Windows\Fonts\dokchamp.ttf
C:\Windows\Fonts\estre.ttf
C:\Windows\Fonts\euphemia.ttf
C:\Windows\Fonts\gautami.ttf
C:\Windows\Fonts\gautamib.ttf
C:\Windows\Fonts\Vani.ttf
C:\Windows\Fonts\Vanib.ttf
C:\Windows\Fonts\gulim.ttc
C:\Windows\Fonts\impact.ttf
C:\Windows\Fonts\iskpota.ttf
C:\Windows\Fonts\iskpotab.ttf
C:\Windows\Fonts\kalinga.ttf
C:\Windows\Fonts\kalingab.ttf
C:\Windows\Fonts\kartika.ttf
C:\Windows\Fonts\kartikab.ttf
C:\Windows\Fonts\KhmerUI.ttf
C:\Windows\Fonts\KhmerUIb.ttf
C:\Windows\Fonts\LaoUI.ttf
C:\Windows\Fonts\LaoUIb.ttf
C:\Windows\Fonts\latha.ttf
C:\Windows\Fonts\lathab.ttf
C:\Windows\Fonts\lucon.ttf
C:\Windows\Fonts\malgun.ttf
C:\Windows\Fonts\malgunbd.ttf
C:\Windows\Fonts\mangal.ttf
C:\Windows\Fonts\mangalb.ttf
C:\Windows\Fonts\himalaya.ttf
C:\Windows\Fonts\msjh.ttf
C:\Windows\Fonts\msjhbd.ttf
C:\Windows\Fonts\msyh.ttf
C:\Windows\Fonts\msyhbd.ttf
C:\Windows\Fonts\mingliu.ttc
C:\Windows\Fonts\mingliub.ttc
C:\Windows\Fonts\monbaiti.ttf
C:\Windows\Fonts\msgothic.ttc
C:\Windows\Fonts\msmincho.ttc
C:\Windows\Fonts\mvboli.ttf
C:\Windows\Fonts\ntailu.ttf
C:\Windows\Fonts\ntailub.ttf
C:\Windows\Fonts\nyala.ttf
C:\Windows\Fonts\phagspa.ttf
C:\Windows\Fonts\phagspab.ttf
C:\Windows\Fonts\plantc.ttf
C:\Windows\Fonts\raavi.ttf
C:\Windows\Fonts\raavib.ttf
C:\Windows\Fonts\segoesc.ttf
C:\Windows\Fonts\segoescb.ttf
C:\Windows\Fonts\segoeui.ttf
C:\Windows\Fonts\segoeuib.ttf
C:\Windows\Fonts\segoeuii.ttf
C:\Windows\Fonts\segoeuiz.ttf
C:\Windows\Fonts\seguisb.ttf
C:\Windows\Fonts\segoeuil.ttf
C:\Windows\Fonts\seguisym.ttf
C:\Windows\Fonts\shruti.ttf
C:\Windows\Fonts\shrutib.ttf
C:\Windows\Fonts\simsun.ttc
C:\Windows\Fonts\simsunb.ttf
C:\Windows\Fonts\sylfaen.ttf
C:\Windows\Fonts\taile.ttf
C:\Windows\Fonts\taileb.ttf
C:\Windows\Fonts\times.ttf
C:\Windows\Fonts\timesi.ttf
C:\Windows\Fonts\timesbd.ttf
C:\Windows\Fonts\timesbi.ttf
C:\Windows\Fonts\tunga.ttf
C:\Windows\Fonts\tungab.ttf
C:\Windows\Fonts\vrinda.ttf
C:\Windows\Fonts\vrindab.ttf
C:\Windows\Fonts\Shonar.ttf
C:\Windows\Fonts\Shonarb.ttf
C:\Windows\Fonts\msyi.ttf
C:\Windows\Fonts\tahoma.ttf
C:\Windows\Fonts\tahomabd.ttf
C:\Windows\Fonts\micross.ttf
C:\Windows\Fonts\angsa.ttf
C:\Windows\Fonts\angsai.ttf
C:\Windows\Fonts\angsab.ttf
C:\Windows\Fonts\angsaz.ttf
C:\Windows\Fonts\aparaj.ttf
C:\Windows\Fonts\aparajb.ttf
C:\Windows\Fonts\aparajbi.ttf
C:\Windows\Fonts\aparaji.ttf
C:\Windows\Fonts\cordia.ttf
C:\Windows\Fonts\cordiai.ttf
C:\Windows\Fonts\cordiab.ttf
C:\Windows\Fonts\cordiaz.ttf
C:\Windows\Fonts\ebrima.ttf
C:\Windows\Fonts\ebrimabd.ttf
C:\Windows\Fonts\gisha.ttf
C:\Windows\Fonts\gishabd.ttf
C:\Windows\Fonts\kokila.ttf
C:\Windows\Fonts\kokilab.ttf
C:\Windows\Fonts\kokilabi.ttf
C:\Windows\Fonts\kokilai.ttf
C:\Windows\Fonts\leelawad.ttf
C:\Windows\Fonts\leelawdb.ttf
C:\Windows\Fonts\msuighur.ttf
C:\Windows\Fonts\moolbor.ttf
C:\Windows\Fonts\symbol.ttf
C:\Windows\Fonts\utsaah.ttf
C:\Windows\Fonts\utsaahb.ttf
C:\Windows\Fonts\utsaahbi.ttf
C:\Windows\Fonts\utsaahi.ttf
C:\Windows\Fonts\vijaya.ttf
C:\Windows\Fonts\vijayab.ttf
C:\Windows\Fonts\wingding.ttf
C:\Windows\Fonts\modern.fon
C:\Windows\Fonts\roman.fon
C:\Windows\Fonts\script.fon
C:\Windows\Fonts\andlso.ttf
C:\Windows\Fonts\arabtype.ttf
C:\Windows\Fonts\simpo.ttf
C:\Windows\Fonts\simpbdo.ttf
C:\Windows\Fonts\simpfxo.ttf
C:\Windows\Fonts\majalla.ttf
C:\Windows\Fonts\majallab.ttf
C:\Windows\Fonts\trado.ttf
C:\Windows\Fonts\tradbdo.ttf
C:\Windows\Fonts\ahronbd.ttf
C:\Windows\Fonts\david.ttf
C:\Windows\Fonts\davidbd.ttf
C:\Windows\Fonts\frank.ttf
C:\Windows\Fonts\lvnm.ttf
C:\Windows\Fonts\lvnmbd.ttf
C:\Windows\Fonts\mriam.ttf
C:\Windows\Fonts\mriamc.ttf
C:\Windows\Fonts\nrkis.ttf
C:\Windows\Fonts\rod.ttf
C:\Windows\Fonts\simfang.ttf
C:\Windows\Fonts\simhei.ttf
C:\Windows\Fonts\simkai.ttf
C:\Windows\Fonts\angsau.ttf
C:\Windows\Fonts\angsaui.ttf
C:\Windows\Fonts\angsaub.ttf
C:\Windows\Fonts\angsauz.ttf
C:\Windows\Fonts\browa.ttf
C:\Windows\Fonts\browai.ttf
C:\Windows\Fonts\browab.ttf
C:\Windows\Fonts\browaz.ttf
C:\Windows\Fonts\browau.ttf
C:\Windows\Fonts\browaui.ttf
C:\Windows\Fonts\browaub.ttf
C:\Windows\Fonts\browauz.ttf
C:\Windows\Fonts\cordiau.ttf
C:\Windows\Fonts\cordiaub.ttf
C:\Windows\Fonts\cordiauz.ttf
C:\Windows\Fonts\cordiaui.ttf
C:\Windows\Fonts\upcdl.ttf
C:\Windows\Fonts\upcdi.ttf
C:\Windows\Fonts\upcdb.ttf
C:\Windows\Fonts\upcdbi.ttf
C:\Windows\Fonts\upcel.ttf
C:\Windows\Fonts\upcei.ttf
C:\Windows\Fonts\upceb.ttf
C:\Windows\Fonts\upcebi.ttf
C:\Windows\Fonts\upcfl.ttf
C:\Windows\Fonts\upcfi.ttf
C:\Windows\Fonts\upcfb.ttf
C:\Windows\Fonts\upcfbi.ttf
C:\Windows\Fonts\upcil.ttf
C:\Windows\Fonts\upcii.ttf
C:\Windows\Fonts\upcib.ttf
C:\Windows\Fonts\upcibi.ttf
C:\Windows\Fonts\upcjl.ttf
C:\Windows\Fonts\upcji.ttf
C:\Windows\Fonts\upcjb.ttf
C:\Windows\Fonts\upcjbi.ttf
C:\Windows\Fonts\upckl.ttf
C:\Windows\Fonts\upcki.ttf
C:\Windows\Fonts\upckb.ttf
C:\Windows\Fonts\upckbi.ttf
C:\Windows\Fonts\upcll.ttf
C:\Windows\Fonts\upcli.ttf
C:\Windows\Fonts\upclb.ttf
C:\Windows\Fonts\upclbi.ttf
C:\Windows\Fonts\kaiu.ttf
C:\Windows\Fonts\l_10646.ttf
C:\Windows\Fonts\ariblk.ttf
C:\Windows\Fonts\calibri.ttf
C:\Windows\Fonts\calibrii.ttf
C:\Windows\Fonts\calibrib.ttf
C:\Windows\Fonts\calibriz.ttf
C:\Windows\Fonts\comic.ttf
C:\Windows\Fonts\comicbd.ttf
C:\Windows\Fonts\framd.ttf
C:\Windows\Fonts\framdit.ttf
C:\Windows\Fonts\Gabriola.ttf
C:\Windows\Fonts\georgia.ttf
C:\Windows\Fonts\georgiai.ttf
C:\Windows\Fonts\georgiab.ttf
C:\Windows\Fonts\georgiaz.ttf
C:\Windows\Fonts\pala.ttf
C:\Windows\Fonts\palai.ttf
C:\Windows\Fonts\palab.ttf
C:\Windows\Fonts\palabi.ttf
C:\Windows\Fonts\segoepr.ttf
C:\Windows\Fonts\segoeprb.ttf
C:\Windows\Fonts\trebuc.ttf
C:\Windows\Fonts\trebucit.ttf
C:\Windows\Fonts\trebucbd.ttf
C:\Windows\Fonts\trebucbi.ttf
C:\Windows\Fonts\verdana.ttf
C:\Windows\Fonts\verdanai.ttf
C:\Windows\Fonts\verdanab.ttf
C:\Windows\Fonts\verdanaz.ttf
C:\Windows\Fonts\webdings.ttf
C:\Windows\Fonts\coure.fon
C:\Windows\Fonts\serife.fon
C:\Windows\Fonts\sserife.fon
C:\Windows\Fonts\smalle.fon
C:\Windows\Fonts\smallf.fon
C:\Windows\Fonts\calibrili.ttf
C:\Windows\Fonts\CALIBRILI.TTF
C:\Windows\Fonts\calibril.ttf
C:\Windows\Fonts\ALGER.TTF
C:\Windows\Fonts\ARIALN.TTF
C:\Windows\Fonts\ARIALNB.TTF
C:\Windows\Fonts\ARIALNBI.TTF
C:\Windows\Fonts\ARIALNI.TTF
C:\Windows\Fonts\BAUHS93.TTF
C:\Windows\Fonts\DUBAI-BOLD.TTF
C:\Windows\Fonts\DUBAI-LIGHT.TTF
C:\Windows\Fonts\DUBAI-MEDIUM.TTF
C:\Windows\Fonts\DUBAI-REGULAR.TTF
C:\Windows\Fonts\GADUGI.TTF
C:\Windows\Fonts\GADUGIB.TTF
C:\Windows\Fonts\HARLOWSI.TTF
C:\Windows\Fonts\MSUIGHUB.TTF
C:\Windows\Fonts\NIRMALA.TTF
C:\Windows\Fonts\NIRMALAB.TTF
C:\Windows\Fonts\SEGOEUISL.TTF
C:\Windows\Fonts\VIVALDII.TTF
C:\Windows\Fonts\MSJH.TTC
C:\Windows\Fonts\MSJHBD.TTC
C:\Windows\Fonts\MSYH.TTC
C:\Windows\Fonts\MSYHBD.TTC
C:\Windows\Fonts\ARIALUNI.TTF
C:\Windows\Fonts\meiryo.ttc
C:\Windows\Fonts\BKANT.TTF
C:\Windows\Fonts\GOTHIC.TTF
C:\Windows\Fonts\HATTEN.TTF
C:\Windows\Fonts\TEMPSITC.TTF
C:\Windows\Fonts\PRISTINA.TTF
C:\Windows\Fonts\PAPYRUS.TTF
C:\Windows\Fonts\MISTRAL.TTF
C:\Windows\Fonts\LHANDW.TTF
C:\Windows\Fonts\ITCKRIST.TTF
C:\Windows\Fonts\JUICE___.TTF
C:\Windows\Fonts\FRSCRIPT.TTF
C:\Windows\Fonts\FREESCPT.TTF
C:\Windows\Fonts\BRADHITC.TTF
C:\Windows\Fonts\MTCORSVA.TTF
C:\Windows\Fonts\BASKVILL.TTF
C:\Windows\Fonts\BELL.TTF
C:\Windows\Fonts\BRLNSB.TTF
C:\Windows\Fonts\BERNHC.TTF
C:\Windows\Fonts\BOD_PSTC.TTF
C:\Windows\Fonts\BRITANIC.TTF
C:\Windows\Fonts\BROADW.TTF
C:\Windows\Fonts\BRUSHSCI.TTF
C:\Windows\Fonts\CALIFR.TTF
C:\Windows\Fonts\CENTAUR.TTF
C:\Windows\Fonts\CHILLER.TTF
C:\Windows\Fonts\COLONNA.TTF
C:\Windows\Fonts\COOPBL.TTF
C:\Windows\Fonts\FTLTLT.TTF
C:\Windows\Fonts\HARNGTON.TTF
C:\Windows\Fonts\HTOWERT.TTF
C:\Windows\Fonts\JOKERMAN.TTF
C:\Windows\Fonts\KUNSTLER.TTF
C:\Windows\Fonts\LBRITE.TTF
C:\Windows\Fonts\LCALLIG.TTF
C:\Windows\Fonts\LFAX.TTF
C:\Windows\Fonts\MAGNETOB.TTF
C:\Windows\Fonts\MATURASC.TTF
C:\Windows\Fonts\MOD20.TTF
C:\Windows\Fonts\NIAGENG.TTF
C:\Windows\Fonts\NIAGSOL.TTF
C:\Windows\Fonts\OLDENGL.TTF
C:\Windows\Fonts\ONYX.TTF
C:\Windows\Fonts\PARCHM.TTF
C:\Windows\Fonts\PLAYBILL.TTF
C:\Windows\Fonts\POORICH.TTF
C:\Windows\Fonts\RAVIE.TTF
C:\Windows\Fonts\INFROMAN.TTF
C:\Windows\Fonts\SHOWG.TTF
C:\Windows\Fonts\SNAP____.TTF
C:\Windows\Fonts\STENCIL.TTF
C:\Windows\Fonts\VINERITC.TTF
C:\Windows\Fonts\VLADIMIR.TTF
C:\Windows\Fonts\LATINWD.TTF
C:\Windows\Fonts\TCM_____.TTF
C:\Windows\Fonts\TCCB____.TTF
C:\Windows\Fonts\TCCM____.TTF
C:\Windows\Fonts\TCB_____.TTF
C:\Windows\Fonts\SCRIPTBL.TTF
C:\Windows\Fonts\ROCKEB.TTF
C:\Windows\Fonts\ROCC____.TTF
C:\Windows\Fonts\ROCK.TTF
C:\Windows\Fonts\RAGE.TTF
C:\Windows\Fonts\PERTIBD.TTF
C:\Windows\Fonts\PER_____.TTF
C:\Windows\Fonts\PALSCRI.TTF
C:\Windows\Fonts\OCRAEXT.TTF
C:\Windows\Fonts\MAIAN.TTF
C:\Windows\Fonts\LTYPE.TTF
C:\Windows\Fonts\LSANS.TTF
C:\Windows\Fonts\IMPRISHA.TTF
C:\Windows\Fonts\GOUDYSTO.TTF
C:\Windows\Fonts\GOUDOS.TTF
C:\Windows\Fonts\GLECB.TTF
C:\Windows\Fonts\GILLUBCD.TTF
C:\Windows\Fonts\GILSANUB.TTF
C:\Windows\Fonts\GILC____.TTF
C:\Windows\Fonts\GIL_____.TTF
C:\Windows\Fonts\GLSNECB.TTF
C:\Windows\Fonts\GIGI.TTF
C:\Windows\Fonts\FRAMDCN.TTF
C:\Windows\Fonts\FRAHV.TTF
C:\Windows\Fonts\FRADMCN.TTF
C:\Windows\Fonts\FRADM.TTF
C:\Windows\Fonts\FRABK.TTF
C:\Windows\Fonts\FORTE.TTF
C:\Windows\Fonts\FELIXTI.TTF
C:\Windows\Fonts\ERASMD.TTF
C:\Windows\Fonts\ERASLGHT.TTF
C:\Windows\Fonts\ERASDEMI.TTF
C:\Windows\Fonts\ERASBD.TTF
C:\Windows\Fonts\ENGR.TTF
C:\Windows\Fonts\ELEPHNT.TTF
C:\Windows\Fonts\ITCEDSCR.TTF
C:\Windows\Fonts\CURLZ___.TTF
C:\Windows\Fonts\COPRGTL.TTF
C:\Windows\Fonts\COPRGTB.TTF
C:\Windows\Fonts\CENSCBK.TTF
C:\Windows\Fonts\CASTELAR.TTF
C:\Windows\Fonts\CALIST.TTF
C:\Windows\Fonts\BOD_CR.TTF
C:\Windows\Fonts\BOD_BLAR.TTF
C:\Windows\Fonts\BOD_R.TTF
C:\Windows\Fonts\ITCBLKAD.TTF
C:\Windows\Fonts\ARLRDBD.TTF
C:\Windows\Fonts\AGENCYB.TTF
C:\Windows\Fonts\meiryob.ttc
C:\Windows\Fonts\ANTQUAB.TTF
C:\Windows\Fonts\ANTQUABI.TTF
C:\Windows\Fonts\ANTQUAI.TTF
C:\Windows\Fonts\GOTHICB.TTF
C:\Windows\Fonts\GOTHICBI.TTF
C:\Windows\Fonts\GOTHICI.TTF
C:\Windows\Fonts\BELLB.TTF
C:\Windows\Fonts\BELLI.TTF
C:\Windows\Fonts\BRLNSDB.TTF
C:\Windows\Fonts\BRLNSR.TTF
C:\Windows\Fonts\CALIFB.TTF
C:\Windows\Fonts\CALIFI.TTF
C:\Windows\Fonts\HTOWERTI.TTF
C:\Windows\Fonts\LBRITED.TTF
C:\Windows\Fonts\LBRITEDI.TTF
C:\Windows\Fonts\LBRITEI.TTF
C:\Windows\Fonts\LFAXD.TTF
C:\Windows\Fonts\LFAXDI.TTF
C:\Windows\Fonts\LFAXI.TTF
C:\Windows\Fonts\TCMI____.TTF
C:\Windows\Fonts\TCCEB.TTF
C:\Windows\Fonts\TCBI____.TTF
C:\Windows\Fonts\ROCCB___.TTF
C:\Windows\Fonts\ROCKB.TTF
C:\Windows\Fonts\ROCKBI.TTF
C:\Windows\Fonts\ROCKI.TTF
C:\Windows\Fonts\PERTILI.TTF
C:\Windows\Fonts\PERBI___.TTF
C:\Windows\Fonts\PERB____.TTF
C:\Windows\Fonts\PERI____.TTF
C:\Windows\Fonts\LTYPEB.TTF
C:\Windows\Fonts\LTYPEBO.TTF
C:\Windows\Fonts\LTYPEO.TTF
C:\Windows\Fonts\LSANSD.TTF
C:\Windows\Fonts\LSANSDI.TTF
C:\Windows\Fonts\LSANSI.TTF
C:\Windows\Fonts\GOUDOSB.TTF
C:\Windows\Fonts\GOUDOSI.TTF
C:\Windows\Fonts\GILBI___.TTF
C:\Windows\Fonts\GILB____.TTF
C:\Windows\Fonts\GILI____.TTF
C:\Windows\Fonts\FRAHVIT.TTF
C:\Windows\Fonts\FRADMIT.TTF
C:\Windows\Fonts\FRABKIT.TTF
C:\Windows\Fonts\ELEPHNTI.TTF
C:\Windows\Fonts\SCHLBKB.TTF
C:\Windows\Fonts\SCHLBKBI.TTF
C:\Windows\Fonts\SCHLBKI.TTF
C:\Windows\Fonts\CALISTB.TTF
C:\Windows\Fonts\CALISTBI.TTF
C:\Windows\Fonts\CALISTI.TTF
C:\Windows\Fonts\BOD_CB.TTF
C:\Windows\Fonts\BOD_CBI.TTF
C:\Windows\Fonts\BOD_CI.TTF
C:\Windows\Fonts\BOD_BLAI.TTF
C:\Windows\Fonts\BOD_B.TTF
C:\Windows\Fonts\BOD_BI.TTF
C:\Windows\Fonts\BOD_I.TTF
C:\Windows\Fonts\AGENCYR.TTF
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF
C:\PROGRAM FILES (X86)\COMMON FILES\MICROSOFT SHARED\EQUATION\MTEXTRA.TTF
C:\Windows\Fonts\OUTLOOK.TTF
C:\Windows\Fonts\CENTURY.TTF
C:\Windows\Fonts\CAMBRIA.TTC
C:\Windows\Fonts\CANDARA.TTF
C:\Windows\Fonts\CONSOLA.TTF
C:\Windows\Fonts\CONSTAN.TTF
C:\Windows\Fonts\CORBEL.TTF
C:\Windows\Fonts\WINGDNG2.TTF
C:\Windows\Fonts\WINGDNG3.TTF
C:\Windows\Fonts\GARA.TTF
C:\Windows\Fonts\BOOKOS.TTF
C:\Windows\Fonts\CAMBRIAB.TTF
C:\Windows\Fonts\CAMBRIAI.TTF
C:\Windows\Fonts\CAMBRIAZ.TTF
C:\Windows\Fonts\CANDARAB.TTF
C:\Windows\Fonts\CANDARAI.TTF
C:\Windows\Fonts\CANDARAZ.TTF
C:\Windows\Fonts\CONSOLAB.TTF
C:\Windows\Fonts\CONSOLAI.TTF
C:\Windows\Fonts\CONSOLAZ.TTF
C:\Windows\Fonts\CONSTANB.TTF
C:\Windows\Fonts\CONSTANI.TTF
C:\Windows\Fonts\CONSTANZ.TTF
C:\Windows\Fonts\CORBELB.TTF
C:\Windows\Fonts\CORBELI.TTF
C:\Windows\Fonts\CORBELZ.TTF
C:\Windows\Fonts\BSSYM7.TTF
C:\Windows\Fonts\REFSAN.TTF
C:\Windows\Fonts\REFSPCL.TTF
C:\Windows\Fonts\GARABD.TTF
C:\Windows\Fonts\GARAIT.TTF
C:\Windows\Fonts\BOOKOSB.TTF
C:\Windows\Fonts\BOOKOSBI.TTF
C:\Windows\Fonts\BOOKOSI.TTF
C:\Windows\Fonts\staticcache.dat
C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
C:\Users\Louise\AppData\Local\Temp\en-US\oTfho.resources.dll
C:\Users\Louise\AppData\Local\Temp\en-US\oTfho.resources\oTfho.resources.dll
C:\Users\Louise\AppData\Local\Temp\en-US\oTfho.resources.exe
C:\Users\Louise\AppData\Local\Temp\en-US\oTfho.resources\oTfho.resources.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\Culture.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\en-US\mscorrc.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\en-US\mscorrc.dll.DLL
C:\Windows\Microsoft.NET\Framework\v2.0.50727\en\mscorrc.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\en\mscorrc.dll.DLL
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
C:\Windows\Globalization\en.nlp
C:\Users\Louise\AppData\Local\Temp\en\oTfho.resources.dll
C:\Users\Louise\AppData\Local\Temp\en\oTfho.resources\oTfho.resources.dll
C:\Users\Louise\AppData\Local\Temp\en\oTfho.resources.exe
C:\Users\Louise\AppData\Local\Temp\en\oTfho.resources\oTfho.resources.exe
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\4ac828c8c4c76f3ba59f8f9c7dab1cb3\Microsoft.VisualBasic.ni.dll
C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
C:\Users\Louise\AppData\Local\Temp\en-US\ReZer0V2.resources.dll
C:\Users\Louise\AppData\Local\Temp\en-US\ReZer0V2.resources\ReZer0V2.resources.dll
C:\Users\Louise\AppData\Local\Temp\en-US\ReZer0V2.resources.exe
C:\Users\Louise\AppData\Local\Temp\en-US\ReZer0V2.resources\ReZer0V2.resources.exe
C:\Users\Louise\AppData\Local\Temp\en\ReZer0V2.resources.dll
C:\Users\Louise\AppData\Local\Temp\en\ReZer0V2.resources\ReZer0V2.resources.dll
C:\Users\Louise\AppData\Local\Temp\en\ReZer0V2.resources.exe
C:\Users\Louise\AppData\Local\Temp\en\ReZer0V2.resources\ReZer0V2.resources.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.1372.5298531
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.1372.5298546
C:\Users\Louise\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1372.5298546
C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\bcrypt.dll
C:\Windows\SysWOW64\en-US\KERNELBASE.dll.mui
C:\Windows\Microsoft.NET\Framework\v2.0.50727\OLEAUT32.dll
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\81ab4c39c6a7c9f50721aca2db09b417\System.Management.ni.dll
C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.INI
C:\Windows\Microsoft.NET\Framework\v2.0.50727\wminet_utils.dll
C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\oleaut32.dll
C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\ntdll.dll
C:\Windows\System32\tzres.dll
C:\Users\Louise\AppData\Roaming\hFqxlHG\
C:\Users\Louise\AppData\Roaming\hFqxlHG
C:\Users\Louise\AppData\Roaming
C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe
C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe:Zone.Identifier
C:\Users\Louise\AppData\Local\Google\Chrome\User Data\
C:\Users\Louise\AppData\Local\Google\Chrome\User Data\*
C:\Users\Louise\AppData\Local\Google\Chrome\User Data\Default\Login Data
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Security\51fb28e8a54a8d8f6021415d47477ab4\System.Security.ni.dll
C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.INI
C:\Users\Louise\AppData\Local\Google\Chrome\User Data\Local State
C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\crypt32.dll
\Device\KsecDD
C:\Users\Louise\AppData\Local\Google\Chrome\User Data\Login Data
C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\profiles.ini
C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\Profiles\0f9yudun.default\logins.json
C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\Profiles\0f9yudun.default\key4.db
C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\Profiles\0f9yudun.default\signons.sqlite
C:\Users\Louise\AppData\Local\Microsoft\Edge\User Data
C:\Users\Louise\AppData\Local\Temp\vaultcli.dll
C:\Program Files (x86)\Common Files\Apple\Apple Application Support\plutil.exe
C:\Users\Louise\AppData\Local\Tencent\QQBrowser\User Data
C:\Users\Louise\AppData\Local\Tencent\QQBrowser\User Data\Default\EncryptedStorage
C:\Users\Louise\AppData\Roaming\Opera Software\Opera Stable
C:\Users\Louise\AppData\Local\Yandex\YandexBrowser\User Data
C:\Users\Louise\AppData\Local\360Chrome\Chrome\User Data
C:\Users\Louise\AppData\Local\Iridium\User Data
C:\Users\Louise\AppData\Local\Comodo\Dragon\User Data
C:\Users\Louise\AppData\Local\MapleStudio\ChromePlus\User Data
C:\Users\Louise\AppData\Local\Chromium\User Data
C:\Users\Louise\AppData\Local\Torch\User Data
C:\Users\Louise\AppData\Local\7Star\7Star\User Data
C:\Users\Louise\AppData\Local\Amigo\User Data
C:\Users\Louise\AppData\Local\BraveSoftware\Brave-Browser\User Data
C:\Users\Louise\AppData\Local\CentBrowser\User Data
C:\Users\Louise\AppData\Local\Chedot\User Data
C:\Users\Louise\AppData\Local\CocCoc\Browser\User Data
C:\Users\Louise\AppData\Local\Elements Browser\User Data
C:\Users\Louise\AppData\Local\Epic Privacy Browser\User Data
C:\Users\Louise\AppData\Local\Kometa\User Data
C:\Users\Louise\AppData\Local\Orbitum\User Data
C:\Users\Louise\AppData\Local\Sputnik\Sputnik\User Data
C:\Users\Louise\AppData\Local\uCozMedia\Uran\User Data
C:\Users\Louise\AppData\Local\Vivaldi\User Data
C:\Users\Louise\AppData\Local\CatalinaGroup\Citrio\User Data
C:\Users\Louise\AppData\Local\liebao\User Data
C:\Users\Louise\AppData\Local\Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
C:\Users\Louise\AppData\Local\QIP Surf\User Data
C:\Users\Louise\AppData\Local\Coowon\Coowon\User Data
C:\Users\Louise\AppData\Roaming\Mozilla\SeaMonkey\profiles.ini
C:\Users\Louise\AppData\Roaming\Flock\Browser\profiles.ini
C:\Users\Louise\AppData\Local\UCBrowser\*
C:\Users\Louise\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
C:\Users\Louise\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
C:\Users\Louise\AppData\Roaming\K-Meleon\profiles.ini
C:\Users\Louise\AppData\Roaming\Mozilla\icecat\profiles.ini
C:\Users\Louise\AppData\Roaming\Comodo\IceDragon\profiles.ini
C:\Users\Louise\AppData\Roaming\Moonchild Productions\Pale Moon\profiles.ini
C:\Users\Louise\AppData\Roaming\Waterfox\profiles.ini
C:\Users\Louise\AppData\Local\falkon\profiles\profiles.ini
C:\Users\Louise\AppData\Roaming\Thunderbird\profiles.ini
C:\Storage\
C:\mail\
C:\Users\Louise\AppData\Local\VirtualStore\Program Files\Foxmail\mail\
C:\Users\Louise\AppData\Local\VirtualStore\Program Files (x86)\Foxmail\mail\
C:\Users\Louise\AppData\Roaming\Opera Mail\Opera Mail\wand.dat
C:\Users\Louise\AppData\Roaming\Pocomail\accounts.ini
C:\Users\Louise\AppData\Roaming\The Bat!
C:\Users\Louise\AppData\Roaming\Postbox\profiles.ini
C:\Users\Louise\AppData\Roaming\Claws-mail
C:\Users\Louise\AppData\Roaming\Claws-mail\clawsrc
C:\Users\Louise\AppData\Local\Temp\Folder.lst
C:\Users\Louise\AppData\Roaming\Trillian\users\global\accounts.dat
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\b065f84b49a27b648015c08fab8cd00e\System.Xml.ni.dll
C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.Xml.INI
C:\Users\Louise\AppData\Roaming\Psi\profiles
C:\Users\Louise\AppData\Roaming\Psi+\profiles
C:\Users\Louise\AppData\Roaming\FileZilla\recentservers.xml
C:\Users\Louise\AppData\Roaming\Ipswitch\WS_FTP\Sites\ws_ftp.ini
C:\Users\Louise\AppData\Roaming\CoreFTP\sites.idx
C:\Windows\SysWOW64\wshom.ocx
C:\FTP Navigator\Ftplist.txt
C:\Users\All Users\AppData\Roaming\FlashFXP\3quick.dat
C:\Users\Louise\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\*.xml
C:\Users\Louise\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
C:\cftp\Ftplist.txt
C:\Users\Louise\AppData\Roaming\FTPGetter\servers.xml
C:\Program Files (x86)\jDownloader\config\database.script
C:\Users\Louise\AppData\Local\Temp\log.tmp
C:\Windows\inf\hdaudio.inf
C:\Windows\sysnative\DriverStore\en-US\hdaudio.inf_loc
C:\Windows\inf\hdaudio.PNF
C:\Windows\Temp
\??\PIPE\samr
C:\DosDevices\pipe\
C:\Windows\sysnative\en-US\KERNELBASE.dll.mui
C:\Windows\sysnative\LogFiles\Scm\eaca24ff-236c-401d-a1e7-b3d5267b8a50
C:\Windows\Registration\R000000000009.clb
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe.config
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll
C:\Windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\msvcr80.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\machine.config
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch
C:\Users\Louise\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config
C:\Users\Louise\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch
C:\Windows\assembly\NativeImages_v2.0.50727_32\index39c.dat
C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\f8420d8c6ede777377fcff48a4beaa2a\mscorlib.ni.dll
C:\Windows\System32\l_intl.nls
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorjit.dll
C:\Windows\assembly\pubpol214.dat
C:\Windows\assembly\NativeImages_v2.0.50727_32\System\0a65164b17e5c64bacdc694ea2439c43\System.ni.dll
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\175df210b784212def386595c25caefb\System.Drawing.ni.dll
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\5669120680b52abf616f3876387ca2cc\System.Windows.Forms.ni.dll
C:\Windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.dll
C:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.24308_none_5c028e37a0121035\GdiPlus.dll
C:\Users\Louise\AppData\Local\GDIPFONTCACHEV1.DAT
C:\Windows\Fonts\marlett.ttf
C:\Windows\Fonts\arial.ttf
C:\Windows\Fonts\ariali.ttf
C:\Windows\Fonts\arialbd.ttf
C:\Windows\Fonts\arialbi.ttf
C:\Windows\Fonts\batang.ttc
C:\Windows\Fonts\cour.ttf
C:\Windows\Fonts\couri.ttf
C:\Windows\Fonts\courbd.ttf
C:\Windows\Fonts\courbi.ttf
C:\Windows\Fonts\daunpenh.ttf
C:\Windows\Fonts\dokchamp.ttf
C:\Windows\Fonts\estre.ttf
C:\Windows\Fonts\euphemia.ttf
C:\Windows\Fonts\gautami.ttf
C:\Windows\Fonts\gautamib.ttf
C:\Windows\Fonts\Vani.ttf
C:\Windows\Fonts\Vanib.ttf
C:\Windows\Fonts\gulim.ttc
C:\Windows\Fonts\impact.ttf
C:\Windows\Fonts\iskpota.ttf
C:\Windows\Fonts\iskpotab.ttf
C:\Windows\Fonts\kalinga.ttf
C:\Windows\Fonts\kalingab.ttf
C:\Windows\Fonts\kartika.ttf
C:\Windows\Fonts\kartikab.ttf
C:\Windows\Fonts\KhmerUI.ttf
C:\Windows\Fonts\KhmerUIb.ttf
C:\Windows\Fonts\LaoUI.ttf
C:\Windows\Fonts\LaoUIb.ttf
C:\Windows\Fonts\latha.ttf
C:\Windows\Fonts\lathab.ttf
C:\Windows\Fonts\lucon.ttf
C:\Windows\Fonts\malgun.ttf
C:\Windows\Fonts\malgunbd.ttf
C:\Windows\Fonts\mangal.ttf
C:\Windows\Fonts\mangalb.ttf
C:\Windows\Fonts\himalaya.ttf
C:\Windows\Fonts\msjh.ttf
C:\Windows\Fonts\msjhbd.ttf
C:\Windows\Fonts\msyh.ttf
C:\Windows\Fonts\msyhbd.ttf
C:\Windows\Fonts\mingliu.ttc
C:\Windows\Fonts\mingliub.ttc
C:\Windows\Fonts\monbaiti.ttf
C:\Windows\Fonts\msgothic.ttc
C:\Windows\Fonts\msmincho.ttc
C:\Windows\Fonts\mvboli.ttf
C:\Windows\Fonts\ntailu.ttf
C:\Windows\Fonts\ntailub.ttf
C:\Windows\Fonts\nyala.ttf
C:\Windows\Fonts\phagspa.ttf
C:\Windows\Fonts\phagspab.ttf
C:\Windows\Fonts\plantc.ttf
C:\Windows\Fonts\raavi.ttf
C:\Windows\Fonts\raavib.ttf
C:\Windows\Fonts\segoesc.ttf
C:\Windows\Fonts\segoescb.ttf
C:\Windows\Fonts\segoeui.ttf
C:\Windows\Fonts\segoeuib.ttf
C:\Windows\Fonts\segoeuii.ttf
C:\Windows\Fonts\segoeuiz.ttf
C:\Windows\Fonts\seguisb.ttf
C:\Windows\Fonts\segoeuil.ttf
C:\Windows\Fonts\seguisym.ttf
C:\Windows\Fonts\shruti.ttf
C:\Windows\Fonts\shrutib.ttf
C:\Windows\Fonts\simsun.ttc
C:\Windows\Fonts\simsunb.ttf
C:\Windows\Fonts\sylfaen.ttf
C:\Windows\Fonts\taile.ttf
C:\Windows\Fonts\taileb.ttf
C:\Windows\Fonts\times.ttf
C:\Windows\Fonts\timesi.ttf
C:\Windows\Fonts\timesbd.ttf
C:\Windows\Fonts\timesbi.ttf
C:\Windows\Fonts\tunga.ttf
C:\Windows\Fonts\tungab.ttf
C:\Windows\Fonts\vrinda.ttf
C:\Windows\Fonts\vrindab.ttf
C:\Windows\Fonts\Shonar.ttf
C:\Windows\Fonts\Shonarb.ttf
C:\Windows\Fonts\msyi.ttf
C:\Windows\Fonts\tahoma.ttf
C:\Windows\Fonts\tahomabd.ttf
C:\Windows\Fonts\micross.ttf
C:\Windows\Fonts\angsa.ttf
C:\Windows\Fonts\angsai.ttf
C:\Windows\Fonts\angsab.ttf
C:\Windows\Fonts\angsaz.ttf
C:\Windows\Fonts\aparaj.ttf
C:\Windows\Fonts\aparajb.ttf
C:\Windows\Fonts\aparajbi.ttf
C:\Windows\Fonts\aparaji.ttf
C:\Windows\Fonts\cordia.ttf
C:\Windows\Fonts\cordiai.ttf
C:\Windows\Fonts\cordiab.ttf
C:\Windows\Fonts\cordiaz.ttf
C:\Windows\Fonts\ebrima.ttf
C:\Windows\Fonts\ebrimabd.ttf
C:\Windows\Fonts\gisha.ttf
C:\Windows\Fonts\gishabd.ttf
C:\Windows\Fonts\kokila.ttf
C:\Windows\Fonts\kokilab.ttf
C:\Windows\Fonts\kokilabi.ttf
C:\Windows\Fonts\kokilai.ttf
C:\Windows\Fonts\leelawad.ttf
C:\Windows\Fonts\leelawdb.ttf
C:\Windows\Fonts\msuighur.ttf
C:\Windows\Fonts\moolbor.ttf
C:\Windows\Fonts\symbol.ttf
C:\Windows\Fonts\utsaah.ttf
C:\Windows\Fonts\utsaahb.ttf
C:\Windows\Fonts\utsaahbi.ttf
C:\Windows\Fonts\utsaahi.ttf
C:\Windows\Fonts\vijaya.ttf
C:\Windows\Fonts\vijayab.ttf
C:\Windows\Fonts\wingding.ttf
C:\Windows\Fonts\modern.fon
C:\Windows\Fonts\roman.fon
C:\Windows\Fonts\script.fon
C:\Windows\Fonts\andlso.ttf
C:\Windows\Fonts\arabtype.ttf
C:\Windows\Fonts\simpo.ttf
C:\Windows\Fonts\simpbdo.ttf
C:\Windows\Fonts\simpfxo.ttf
C:\Windows\Fonts\majalla.ttf
C:\Windows\Fonts\majallab.ttf
C:\Windows\Fonts\trado.ttf
C:\Windows\Fonts\tradbdo.ttf
C:\Windows\Fonts\ahronbd.ttf
C:\Windows\Fonts\david.ttf
C:\Windows\Fonts\davidbd.ttf
C:\Windows\Fonts\frank.ttf
C:\Windows\Fonts\lvnm.ttf
C:\Windows\Fonts\lvnmbd.ttf
C:\Windows\Fonts\mriam.ttf
C:\Windows\Fonts\mriamc.ttf
C:\Windows\Fonts\nrkis.ttf
C:\Windows\Fonts\rod.ttf
C:\Windows\Fonts\simfang.ttf
C:\Windows\Fonts\simhei.ttf
C:\Windows\Fonts\simkai.ttf
C:\Windows\Fonts\angsau.ttf
C:\Windows\Fonts\angsaui.ttf
C:\Windows\Fonts\angsaub.ttf
C:\Windows\Fonts\angsauz.ttf
C:\Windows\Fonts\browa.ttf
C:\Windows\Fonts\browai.ttf
C:\Windows\Fonts\browab.ttf
C:\Windows\Fonts\browaz.ttf
C:\Windows\Fonts\browau.ttf
C:\Windows\Fonts\browaui.ttf
C:\Windows\Fonts\browaub.ttf
C:\Windows\Fonts\browauz.ttf
C:\Windows\Fonts\cordiau.ttf
C:\Windows\Fonts\cordiaub.ttf
C:\Windows\Fonts\cordiauz.ttf
C:\Windows\Fonts\cordiaui.ttf
C:\Windows\Fonts\upcdl.ttf
C:\Windows\Fonts\upcdi.ttf
C:\Windows\Fonts\upcdb.ttf
C:\Windows\Fonts\upcdbi.ttf
C:\Windows\Fonts\upcel.ttf
C:\Windows\Fonts\upcei.ttf
C:\Windows\Fonts\upceb.ttf
C:\Windows\Fonts\upcebi.ttf
C:\Windows\Fonts\upcfl.ttf
C:\Windows\Fonts\upcfi.ttf
C:\Windows\Fonts\upcfb.ttf
C:\Windows\Fonts\upcfbi.ttf
C:\Windows\Fonts\upcil.ttf
C:\Windows\Fonts\upcii.ttf
C:\Windows\Fonts\upcib.ttf
C:\Windows\Fonts\upcibi.ttf
C:\Windows\Fonts\upcjl.ttf
C:\Windows\Fonts\upcji.ttf
C:\Windows\Fonts\upcjb.ttf
C:\Windows\Fonts\upcjbi.ttf
C:\Windows\Fonts\upckl.ttf
C:\Windows\Fonts\upcki.ttf
C:\Windows\Fonts\upckb.ttf
C:\Windows\Fonts\upckbi.ttf
C:\Windows\Fonts\upcll.ttf
C:\Windows\Fonts\upcli.ttf
C:\Windows\Fonts\upclb.ttf
C:\Windows\Fonts\upclbi.ttf
C:\Windows\Fonts\kaiu.ttf
C:\Windows\Fonts\l_10646.ttf
C:\Windows\Fonts\ariblk.ttf
C:\Windows\Fonts\calibri.ttf
C:\Windows\Fonts\calibrii.ttf
C:\Windows\Fonts\calibrib.ttf
C:\Windows\Fonts\calibriz.ttf
C:\Windows\Fonts\comic.ttf
C:\Windows\Fonts\comicbd.ttf
C:\Windows\Fonts\framd.ttf
C:\Windows\Fonts\framdit.ttf
C:\Windows\Fonts\Gabriola.ttf
C:\Windows\Fonts\georgia.ttf
C:\Windows\Fonts\georgiai.ttf
C:\Windows\Fonts\georgiab.ttf
C:\Windows\Fonts\georgiaz.ttf
C:\Windows\Fonts\pala.ttf
C:\Windows\Fonts\palai.ttf
C:\Windows\Fonts\palab.ttf
C:\Windows\Fonts\palabi.ttf
C:\Windows\Fonts\segoepr.ttf
C:\Windows\Fonts\segoeprb.ttf
C:\Windows\Fonts\trebuc.ttf
C:\Windows\Fonts\trebucit.ttf
C:\Windows\Fonts\trebucbd.ttf
C:\Windows\Fonts\trebucbi.ttf
C:\Windows\Fonts\verdana.ttf
C:\Windows\Fonts\verdanai.ttf
C:\Windows\Fonts\verdanab.ttf
C:\Windows\Fonts\verdanaz.ttf
C:\Windows\Fonts\webdings.ttf
C:\Windows\Fonts\coure.fon
C:\Windows\Fonts\serife.fon
C:\Windows\Fonts\sserife.fon
C:\Windows\Fonts\smalle.fon
C:\Windows\Fonts\smallf.fon
C:\Windows\Fonts\CALIBRILI.TTF
C:\Windows\Fonts\calibril.ttf
C:\Windows\Fonts\ALGER.TTF
C:\Windows\Fonts\ARIALN.TTF
C:\Windows\Fonts\ARIALNB.TTF
C:\Windows\Fonts\ARIALNBI.TTF
C:\Windows\Fonts\ARIALNI.TTF
C:\Windows\Fonts\BAUHS93.TTF
C:\Windows\Fonts\DUBAI-BOLD.TTF
C:\Windows\Fonts\DUBAI-LIGHT.TTF
C:\Windows\Fonts\DUBAI-MEDIUM.TTF
C:\Windows\Fonts\DUBAI-REGULAR.TTF
C:\Windows\Fonts\GADUGI.TTF
C:\Windows\Fonts\GADUGIB.TTF
C:\Windows\Fonts\HARLOWSI.TTF
C:\Windows\Fonts\MSUIGHUB.TTF
C:\Windows\Fonts\NIRMALA.TTF
C:\Windows\Fonts\NIRMALAB.TTF
C:\Windows\Fonts\SEGOEUISL.TTF
C:\Windows\Fonts\VIVALDII.TTF
C:\Windows\Fonts\MSJH.TTC
C:\Windows\Fonts\MSJHBD.TTC
C:\Windows\Fonts\MSYH.TTC
C:\Windows\Fonts\MSYHBD.TTC
C:\Windows\Fonts\ARIALUNI.TTF
C:\Windows\Fonts\meiryo.ttc
C:\Windows\Fonts\BKANT.TTF
C:\Windows\Fonts\GOTHIC.TTF
C:\Windows\Fonts\HATTEN.TTF
C:\Windows\Fonts\TEMPSITC.TTF
C:\Windows\Fonts\PRISTINA.TTF
C:\Windows\Fonts\PAPYRUS.TTF
C:\Windows\Fonts\MISTRAL.TTF
C:\Windows\Fonts\LHANDW.TTF
C:\Windows\Fonts\ITCKRIST.TTF
C:\Windows\Fonts\JUICE___.TTF
C:\Windows\Fonts\FRSCRIPT.TTF
C:\Windows\Fonts\FREESCPT.TTF
C:\Windows\Fonts\BRADHITC.TTF
C:\Windows\Fonts\MTCORSVA.TTF
C:\Windows\Fonts\BASKVILL.TTF
C:\Windows\Fonts\BELL.TTF
C:\Windows\Fonts\BRLNSB.TTF
C:\Windows\Fonts\BERNHC.TTF
C:\Windows\Fonts\BOD_PSTC.TTF
C:\Windows\Fonts\BRITANIC.TTF
C:\Windows\Fonts\BROADW.TTF
C:\Windows\Fonts\BRUSHSCI.TTF
C:\Windows\Fonts\CALIFR.TTF
C:\Windows\Fonts\CENTAUR.TTF
C:\Windows\Fonts\CHILLER.TTF
C:\Windows\Fonts\COLONNA.TTF
C:\Windows\Fonts\COOPBL.TTF
C:\Windows\Fonts\FTLTLT.TTF
C:\Windows\Fonts\HARNGTON.TTF
C:\Windows\Fonts\HTOWERT.TTF
C:\Windows\Fonts\JOKERMAN.TTF
C:\Windows\Fonts\KUNSTLER.TTF
C:\Windows\Fonts\LBRITE.TTF
C:\Windows\Fonts\LCALLIG.TTF
C:\Windows\Fonts\LFAX.TTF
C:\Windows\Fonts\MAGNETOB.TTF
C:\Windows\Fonts\MATURASC.TTF
C:\Windows\Fonts\MOD20.TTF
C:\Windows\Fonts\NIAGENG.TTF
C:\Windows\Fonts\NIAGSOL.TTF
C:\Windows\Fonts\OLDENGL.TTF
C:\Windows\Fonts\ONYX.TTF
C:\Windows\Fonts\PARCHM.TTF
C:\Windows\Fonts\PLAYBILL.TTF
C:\Windows\Fonts\POORICH.TTF
C:\Windows\Fonts\RAVIE.TTF
C:\Windows\Fonts\INFROMAN.TTF
C:\Windows\Fonts\SHOWG.TTF
C:\Windows\Fonts\SNAP____.TTF
C:\Windows\Fonts\STENCIL.TTF
C:\Windows\Fonts\VINERITC.TTF
C:\Windows\Fonts\VLADIMIR.TTF
C:\Windows\Fonts\LATINWD.TTF
C:\Windows\Fonts\TCM_____.TTF
C:\Windows\Fonts\TCCB____.TTF
C:\Windows\Fonts\TCCM____.TTF
C:\Windows\Fonts\TCB_____.TTF
C:\Windows\Fonts\SCRIPTBL.TTF
C:\Windows\Fonts\ROCKEB.TTF
C:\Windows\Fonts\ROCC____.TTF
C:\Windows\Fonts\ROCK.TTF
C:\Windows\Fonts\RAGE.TTF
C:\Windows\Fonts\PERTIBD.TTF
C:\Windows\Fonts\PER_____.TTF
C:\Windows\Fonts\PALSCRI.TTF
C:\Windows\Fonts\OCRAEXT.TTF
C:\Windows\Fonts\MAIAN.TTF
C:\Windows\Fonts\LTYPE.TTF
C:\Windows\Fonts\LSANS.TTF
C:\Windows\Fonts\IMPRISHA.TTF
C:\Windows\Fonts\GOUDYSTO.TTF
C:\Windows\Fonts\GOUDOS.TTF
C:\Windows\Fonts\GLECB.TTF
C:\Windows\Fonts\GILLUBCD.TTF
C:\Windows\Fonts\GILSANUB.TTF
C:\Windows\Fonts\GILC____.TTF
C:\Windows\Fonts\GIL_____.TTF
C:\Windows\Fonts\GLSNECB.TTF
C:\Windows\Fonts\GIGI.TTF
C:\Windows\Fonts\FRAMDCN.TTF
C:\Windows\Fonts\FRAHV.TTF
C:\Windows\Fonts\FRADMCN.TTF
C:\Windows\Fonts\FRADM.TTF
C:\Windows\Fonts\FRABK.TTF
C:\Windows\Fonts\FORTE.TTF
C:\Windows\Fonts\FELIXTI.TTF
C:\Windows\Fonts\ERASMD.TTF
C:\Windows\Fonts\ERASLGHT.TTF
C:\Windows\Fonts\ERASDEMI.TTF
C:\Windows\Fonts\ERASBD.TTF
C:\Windows\Fonts\ENGR.TTF
C:\Windows\Fonts\ELEPHNT.TTF
C:\Windows\Fonts\ITCEDSCR.TTF
C:\Windows\Fonts\CURLZ___.TTF
C:\Windows\Fonts\COPRGTL.TTF
C:\Windows\Fonts\COPRGTB.TTF
C:\Windows\Fonts\CENSCBK.TTF
C:\Windows\Fonts\CASTELAR.TTF
C:\Windows\Fonts\CALIST.TTF
C:\Windows\Fonts\BOD_CR.TTF
C:\Windows\Fonts\BOD_BLAR.TTF
C:\Windows\Fonts\BOD_R.TTF
C:\Windows\Fonts\ITCBLKAD.TTF
C:\Windows\Fonts\ARLRDBD.TTF
C:\Windows\Fonts\AGENCYB.TTF
C:\Windows\Fonts\meiryob.ttc
C:\Windows\Fonts\ANTQUAB.TTF
C:\Windows\Fonts\ANTQUABI.TTF
C:\Windows\Fonts\ANTQUAI.TTF
C:\Windows\Fonts\GOTHICB.TTF
C:\Windows\Fonts\GOTHICBI.TTF
C:\Windows\Fonts\GOTHICI.TTF
C:\Windows\Fonts\BELLB.TTF
C:\Windows\Fonts\BELLI.TTF
C:\Windows\Fonts\BRLNSDB.TTF
C:\Windows\Fonts\BRLNSR.TTF
C:\Windows\Fonts\CALIFB.TTF
C:\Windows\Fonts\CALIFI.TTF
C:\Windows\Fonts\HTOWERTI.TTF
C:\Windows\Fonts\LBRITED.TTF
C:\Windows\Fonts\LBRITEDI.TTF
C:\Windows\Fonts\LBRITEI.TTF
C:\Windows\Fonts\LFAXD.TTF
C:\Windows\Fonts\LFAXDI.TTF
C:\Windows\Fonts\LFAXI.TTF
C:\Windows\Fonts\TCMI____.TTF
C:\Windows\Fonts\TCCEB.TTF
C:\Windows\Fonts\TCBI____.TTF
C:\Windows\Fonts\ROCCB___.TTF
C:\Windows\Fonts\ROCKB.TTF
C:\Windows\Fonts\ROCKBI.TTF
C:\Windows\Fonts\ROCKI.TTF
C:\Windows\Fonts\PERTILI.TTF
C:\Windows\Fonts\PERBI___.TTF
C:\Windows\Fonts\PERB____.TTF
C:\Windows\Fonts\PERI____.TTF
C:\Windows\Fonts\LTYPEB.TTF
C:\Windows\Fonts\LTYPEBO.TTF
C:\Windows\Fonts\LTYPEO.TTF
C:\Windows\Fonts\LSANSD.TTF
C:\Windows\Fonts\LSANSDI.TTF
C:\Windows\Fonts\LSANSI.TTF
C:\Windows\Fonts\GOUDOSB.TTF
C:\Windows\Fonts\GOUDOSI.TTF
C:\Windows\Fonts\GILBI___.TTF
C:\Windows\Fonts\GILB____.TTF
C:\Windows\Fonts\GILI____.TTF
C:\Windows\Fonts\FRAHVIT.TTF
C:\Windows\Fonts\FRADMIT.TTF
C:\Windows\Fonts\FRABKIT.TTF
C:\Windows\Fonts\ELEPHNTI.TTF
C:\Windows\Fonts\SCHLBKB.TTF
C:\Windows\Fonts\SCHLBKBI.TTF
C:\Windows\Fonts\SCHLBKI.TTF
C:\Windows\Fonts\CALISTB.TTF
C:\Windows\Fonts\CALISTBI.TTF
C:\Windows\Fonts\CALISTI.TTF
C:\Windows\Fonts\BOD_CB.TTF
C:\Windows\Fonts\BOD_CBI.TTF
C:\Windows\Fonts\BOD_CI.TTF
C:\Windows\Fonts\BOD_BLAI.TTF
C:\Windows\Fonts\BOD_B.TTF
C:\Windows\Fonts\BOD_BI.TTF
C:\Windows\Fonts\BOD_I.TTF
C:\Windows\Fonts\AGENCYR.TTF
C:\PROGRAM FILES (X86)\COMMON FILES\MICROSOFT SHARED\EQUATION\MTEXTRA.TTF
C:\Windows\Fonts\OUTLOOK.TTF
C:\Windows\Fonts\CENTURY.TTF
C:\Windows\Fonts\CAMBRIA.TTC
C:\Windows\Fonts\CANDARA.TTF
C:\Windows\Fonts\CONSOLA.TTF
C:\Windows\Fonts\CONSTAN.TTF
C:\Windows\Fonts\CORBEL.TTF
C:\Windows\Fonts\WINGDNG2.TTF
C:\Windows\Fonts\WINGDNG3.TTF
C:\Windows\Fonts\GARA.TTF
C:\Windows\Fonts\BOOKOS.TTF
C:\Windows\Fonts\CAMBRIAB.TTF
C:\Windows\Fonts\CAMBRIAI.TTF
C:\Windows\Fonts\CAMBRIAZ.TTF
C:\Windows\Fonts\CANDARAB.TTF
C:\Windows\Fonts\CANDARAI.TTF
C:\Windows\Fonts\CANDARAZ.TTF
C:\Windows\Fonts\CONSOLAB.TTF
C:\Windows\Fonts\CONSOLAI.TTF
C:\Windows\Fonts\CONSOLAZ.TTF
C:\Windows\Fonts\CONSTANB.TTF
C:\Windows\Fonts\CONSTANI.TTF
C:\Windows\Fonts\CONSTANZ.TTF
C:\Windows\Fonts\CORBELB.TTF
C:\Windows\Fonts\CORBELI.TTF
C:\Windows\Fonts\CORBELZ.TTF
C:\Windows\Fonts\BSSYM7.TTF
C:\Windows\Fonts\REFSAN.TTF
C:\Windows\Fonts\REFSPCL.TTF
C:\Windows\Fonts\GARABD.TTF
C:\Windows\Fonts\GARAIT.TTF
C:\Windows\Fonts\BOOKOSB.TTF
C:\Windows\Fonts\BOOKOSBI.TTF
C:\Windows\Fonts\BOOKOSI.TTF
C:\Windows\Fonts\staticcache.dat
C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
C:\Windows\Microsoft.NET\Framework\v2.0.50727\Culture.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\4ac828c8c4c76f3ba59f8f9c7dab1cb3\Microsoft.VisualBasic.ni.dll
C:\Windows\SysWOW64\en-US\KERNELBASE.dll.mui
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\81ab4c39c6a7c9f50721aca2db09b417\System.Management.ni.dll
C:\Windows\Microsoft.NET\Framework\v2.0.50727\wminet_utils.dll
C:\Windows\System32\tzres.dll
C:\Users\Louise\AppData\Local\Google\Chrome\User Data\Default\Login Data
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Security\51fb28e8a54a8d8f6021415d47477ab4\System.Security.ni.dll
C:\Users\Louise\AppData\Local\Google\Chrome\User Data\Local State
\Device\KsecDD
C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\profiles.ini
C:\Users\Louise\AppData\Roaming\Mozilla\Firefox\Profiles\0f9yudun.default\key4.db
C:\Users\Louise\AppData\Roaming\Mozilla\SeaMonkey\profiles.ini
C:\Users\Louise\AppData\Roaming\Flock\Browser\profiles.ini
C:\Users\Louise\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
C:\Users\Louise\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
C:\Users\Louise\AppData\Roaming\K-Meleon\profiles.ini
C:\Users\Louise\AppData\Roaming\Mozilla\icecat\profiles.ini
C:\Users\Louise\AppData\Roaming\Comodo\IceDragon\profiles.ini
C:\Users\Louise\AppData\Roaming\Moonchild Productions\Pale Moon\profiles.ini
C:\Users\Louise\AppData\Roaming\Waterfox\profiles.ini
C:\Users\Louise\AppData\Local\falkon\profiles\profiles.ini
C:\Users\Louise\AppData\Roaming\Thunderbird\profiles.ini
C:\Users\Louise\AppData\Roaming\Postbox\profiles.ini
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\b065f84b49a27b648015c08fab8cd00e\System.Xml.ni.dll
C:\Users\Louise\AppData\Roaming\FileZilla\recentservers.xml
C:\Users\Louise\AppData\Roaming\CoreFTP\sites.idx
C:\Windows\SysWOW64\wshom.ocx
C:\FTP Navigator\Ftplist.txt
C:\Windows\inf\hdaudio.PNF
\??\PIPE\samr
C:\Windows\sysnative\en-US\KERNELBASE.dll.mui
C:\Windows\sysnative\LogFiles\Scm\eaca24ff-236c-401d-a1e7-b3d5267b8a50
C:\Windows\Registration\R000000000009.clb
C:\Users\Louise\AppData\Local\GDIPFONTCACHEV1.DAT
C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe
C:\Users\Louise\AppData\Local\Temp\log.tmp
\??\PIPE\samr
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.1372.5298531
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.1372.5298546
C:\Users\Louise\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1372.5298546
C:\Users\Louise\AppData\Roaming\hFqxlHG\afPZt.exe:Zone.Identifier
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\Policy\v4.0
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\CLRLoadLogDir
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\OnlyUseLatestCLR
Policy\Standards
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\Policy\Standards
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\Policy\Standards\v2.0.50727
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Fusion\NoClientChecks
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\SideBySide
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\SideBySide\AssemblyStorageRoots
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\GCStressStart
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\GCStressStartAtJit
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\AppPatch
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\Policy\AppPatch\v4.0.30319.00000
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\Policy\AppPatch\v4.0.30319.00000\mscorwks.dll
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zbuFITgIccG.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\CacheLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\DownloadCacheQuotaInKB
HKEY_CURRENT_USER\Software\Microsoft\Fusion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\EnableLog
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\LoggingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\ForceLog
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\LogFailures
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\VersioningLog
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\LogResourceBinds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\UseLegacyIdentityFormat
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\DisableMSIPeek
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NoClientChecks
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v2.0
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Security\Policy\Extensions\NamedPermissionSets
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\Security\Policy\Extensions\NamedPermissionSets\Internet
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\Security\Policy\Extensions\NamedPermissionSets\LocalIntranet
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-1339698970-4093829097-1161395185-1000
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v2.0.50727\Security\Policy
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\LatestIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\index39c
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\index39c\NIUsageMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\index39c\ILUsageMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\LastModTime
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\GACChangeNotification\Default
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\mscorlib,2.0.0.0,,b77a5c561934e089,x86
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3b360f69\36def128
HKEY_LOCAL_MACHINE\Software\Microsoft\StrongName
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\Latest
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\index214
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\LegacyPolicyTimeStamp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Windows.Forms,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Drawing__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Drawing,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Xml,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Configuration,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Deployment,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Runtime.Serialization.Formatters.Soap__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Runtime.Serialization.Formatters.Soap,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.Accessibility__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\Accessibility,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Security__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Security,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\APTCA
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\DbgJITDebugLaunchSetting
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\DbgManagedDebugger
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus\FontCachePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\SafeProcessSearchMode
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
HKEY_CURRENT_USER\EUDC\1252
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Locale
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Locale\Alternate Sorts
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Language Groups
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Locale\00000409
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Groups\1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\Disable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\DataFilePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane1
\xf6d0\x22bEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane10
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane11
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane12
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane13
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane14
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane15
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane16
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Segoe UI
HKEY_CLASSES_ROOT\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\Instance
HKEY_CLASSES_ROOT\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\Instance\Disabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3219767f\4a4ca7a4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-1339698970-4093829097-1161395185-1000\Installer\Assemblies\C:|Users|Louise|AppData|Local|Temp|zbuFITgIccG.exe
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|Louise|AppData|Local|Temp|zbuFITgIccG.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|Louise|AppData|Local|Temp|zbuFITgIccG.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-1339698970-4093829097-1161395185-1000\Installer\Assemblies\Global
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Windows Error Reporting\WMR
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3219767f\49dc4487
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.8.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\Microsoft.VisualBasic,8.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Web__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Web,2.0.0.0,,b03f5f7f11d50a3a,x86
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Management,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Runtime.Remoting,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\25fd5cf0\fe3ad34
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\25fd5cf0\21bb12f8
HKEY_CURRENT_USER\Software\Classes
HKEY_CURRENT_USER\Software\Classes\AppID\zbuFITgIccG.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\AppCompat
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\AppCompat\RaiseDefaultAuthnLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\DefaultAccessPermission
HKEY_CURRENT_USER\Software\Classes\Interface\{00000134-0000-0000-C000-000000000046}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00000134-0000-0000-C000-000000000046}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00000134-0000-0000-C000-000000000046}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\Software\Microsoft\Rpc\Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\NdrOleExtDLL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\RemoteRpcDll
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BFE
HKEY_LOCAL_MACHINE\Software\Microsoft\SQMClient\Windows\DisabledProcesses\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\DisabledProcesses\3C801B0F
HKEY_LOCAL_MACHINE\Software\Microsoft\SQMClient\Windows\DisabledSessions\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\DisabledSessions\MachineThrottling
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\DisabledSessions\GlobalSession
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SQMClient\Windows
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows\CEIPEnable
HKEY_LOCAL_MACHINE\Software\Microsoft\SQMClient\Windows
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPEnable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPSampledIn
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\37f8695\1cef1c96
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\Enabled
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
HKEY_CURRENT_USER\Software\Classes\WinMgmts
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WINMGMTS\CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WINMGMTS\CLSID\(Default)
HKEY_LOCAL_MACHINE\Software\Microsoft\Wbem\Scripting
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\WBEM\Scripting\Default Namespace
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Hostname
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\System\DNSclient
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Domain
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.8.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\Microsoft.JScript,8.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Configuration.Install,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727\WMIDisableCOMSecurity
HKEY_CURRENT_USER\Control Panel\International
HKEY_CURRENT_USER\Control Panel\International\sYearMonth
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\AppContext
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\QHqFoFvd
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
\x5208\x261EY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Tahoma
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\Compatibility\zbuFITgIccG.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\CTF\TIP\{0000897b-83df-4b96-be07-0fb58b01c4a4}\LanguageProfile\0x00000000\{0001bea3-ed56-483d-a2e2-aeae25577436}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\TIP\{0000897b-83df-4b96-be07-0fb58b01c4a4}\LanguageProfile\0x00000000\{0001bea3-ed56-483d-a2e2-aeae25577436}\Enable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\CTF\EnableAnchorContext
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\KnownClasses
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.2.0.System.Data.SqlXml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Data.SqlXml,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
HKEY_CURRENT_USER\Software\IncrediMail\Identities
HKEY_CURRENT_USER\Software\Qualcomm\Eudora\CommandLine
HKEY_CURRENT_USER\Software\RimArts\B2\Settings
HKEY_CURRENT_USER\Software\OpenVPN-GUI\configs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\MissingDependencies
HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
HKEY_CLASSES_ROOT\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32\Class
HKEY_CURRENT_USER\Software\Classes\TypeLib
HKEY_CURRENT_USER\Software\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0\409
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0\9
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0\0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0\0\win32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0\0\win32\(Default)
HKEY_CURRENT_USER\Software\FTPWare\COREFTP\Sites
HKEY_CURRENT_USER\Software\DownloadManager\Passwords
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\DeviceDesc
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Control Panel\International
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Control Panel\International\LocaleName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc}\00000007
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc}\00000007\00000000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc}\00000007\00000000\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc}\00000007\00000000\Data
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994ad04-93ef-11d0-a3cc-00a0c9223196}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#hdaudio#func_01&ven_1af4&dev_0022&subsys_1af40022&rev_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#elineoutwave
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#hdaudio#func_01&ven_1af4&dev_0022&subsys_1af40022&rev_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\DeviceInstance
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutWave\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutWave\Control\Linked
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\Properties
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{eb115ffc-10c8-4964-831d-6dcb02e6f23f}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30baf1db&0&0001#{eb115ffc-10c8-4964-831d-6dcb02e6f23f}\#elineoutwave
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30baf1db&0&0001#{eb115ffc-10c8-4964-831d-6dcb02e6f23f}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{eb115ffc-10c8-4964-831d-6dcb02e6f23f}\DeviceInstance
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{eb115ffc-10c8-4964-831d-6dcb02e6f23f}\#eLineOutWave\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{eb115ffc-10c8-4964-831d-6dcb02e6f23f}\#eLineOutWave\Control\Linked
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\Properties
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#hdaudio#func_01&ven_1af4&dev_0022&subsys_1af40022&rev_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#elineouttopo
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Control\Linked
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineInTopo
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineInWave
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30baf1db&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutWave
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Capabilities
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\ConfigFlags
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{840b8171-b0ad-410f-8581-cccc0382cfef}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{840b8171-b0ad-410f-8581-cccc0382cfef}\00000000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{840b8171-b0ad-410f-8581-cccc0382cfef}\00000000\00000000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{840b8171-b0ad-410f-8581-cccc0382cfef}\00000000\00000000\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{840b8171-b0ad-410f-8581-cccc0382cfef}\00000000\00000000\Data
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutWave\Properties
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Power\PowerRequestOverride
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Power\PowerRequestOverride
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Power\PowerRequestOverride\Driver
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-1339698970-4093829097-1161395185-1000\ProfileImagePath
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Environment
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Volatile Environment
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Volatile Environment\0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\SYSTEM\Setup
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SystemSetupInProgress
HKEY_LOCAL_MACHINE\SYSTEM\Setup\UpgradeInProgress
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Safeboot\Option
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS\VssAccessControl
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Rpc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS\Settings
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Settings\ActiveWriterStateTimeout
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS\Diag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\(Default)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS\Diag\WMI Writer
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Settings\TornComponentsMax
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM\ConfigValueEssNeedsLoading
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\WOW64
HKEY_USERS\S-1-5-18
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_USERS\.DEFAULT\Environment
HKEY_USERS\.DEFAULT\Volatile Environment
HKEY_USERS\.DEFAULT\Volatile Environment\0
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\Environment
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\RequiredPrivileges
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ObjectName
HKEY_LOCAL_MACHINE\Software\Microsoft\COM3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\COM3\Com+Enabled
HKEY_CURRENT_USER\Software\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\LocalService
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\DllSurrogate
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\RunAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\ActivateAtStorage
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\ROTFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\AppIDFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\LaunchPermission
HKEY_LOCAL_MACHINE\Software\Microsoft\OLE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\LegacyAuthenticationLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\LegacyImpersonationLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\AuthenticationLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\RemoteServerName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\SRPTrustLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\PreferredServerBitness
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\LoadUserSettings
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\AccessPermission
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\CLRLoadLogDir
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\OnlyUseLatestCLR
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Fusion\NoClientChecks
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\GCStressStart
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\GCStressStartAtJit
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\CacheLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\DownloadCacheQuotaInKB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\EnableLog
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\LoggingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\ForceLog
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\LogFailures
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\VersioningLog
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\LogResourceBinds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\UseLegacyIdentityFormat
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\DisableMSIPeek
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NoClientChecks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\LatestIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\index39c\NIUsageMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\index39c\ILUsageMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\181938c6\7950e2c5\c8\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\7950e2c5\780ee13f\c9\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\mscorlib,2.0.0.0,,b77a5c561934e089,x86
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\Latest
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\index214
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\LegacyPolicyTimeStamp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\61e7e666\c991064\ba\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\475dce40\304b33ae\cb\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\19ab8d57\46ad1249\cf\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2dd6ac50\553abeb3\cc\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\424bd4d8\324708cb\ce\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\41c04c7e\4bf62c79\c0\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3ced59c5\3dc46903\c6\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\c991064\5086dba8\c1\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\30bc7c4f\3f50fe4f\c7\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\3f50fe4f\257bdb20\d0\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\3cca06a0\6dc7d4c0\bb\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\6dc7d4c0\12d2be49\c8\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Windows.Forms,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Drawing,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Xml,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Configuration,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Deployment,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Runtime.Serialization.Formatters.Soap,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\Accessibility,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Security,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\DbgJITDebugLaunchSetting
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\DbgManagedDebugger
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus\FontCachePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\SafeProcessSearchMode
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Locale\00000409
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Groups\1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\Disable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\DataFilePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane1
\xf6d0\x22bEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane10
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane11
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane12
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane13
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane14
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane15
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane16
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\1c22df2f\4f99a7c9\47\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\f6e8397\3e045c21\b7\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\2b1a4e4\23e7306f\5d\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\24bf93f6\6e527edf\b6\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\4f99a7c9\191b956f\3f\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\Microsoft.VisualBasic,8.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Web,2.0.0.0,,b03f5f7f11d50a3a,x86
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Management,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Runtime.Remoting,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\AppCompat\RaiseDefaultAuthnLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\DefaultAccessPermission
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00000134-0000-0000-C000-000000000046}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\NdrOleExtDLL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\RemoteRpcDll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\DisabledProcesses\3C801B0F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\DisabledSessions\MachineThrottling
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\DisabledSessions\GlobalSession
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows\CEIPEnable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPEnable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPSampledIn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\Enabled
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WINMGMTS\CLSID\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\WBEM\Scripting\Default Namespace
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Hostname
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Domain
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\5a8de2c3\2b1a4e4\5c\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\73843e06\61f4f6f6\ae\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\141dfd70\41a2a33b\5b\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\Microsoft.JScript,8.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Configuration.Install,2.0.0.0,,b03f5f7f11d50a3a,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727\WMIDisableCOMSecurity
HKEY_CURRENT_USER\Control Panel\International\sYearMonth
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\QHqFoFvd
\x5208\x261EY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Plane2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\TIP\{0000897b-83df-4b96-be07-0fb58b01c4a4}\LanguageProfile\0x00000000\{0001bea3-ed56-483d-a2e2-aeae25577436}\Enable
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\CTF\EnableAnchorContext
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6f06001f\475dce40\c0\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\Modules
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\SIG
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\IL\75638fee\658578aa\c2\LastModTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\GACChangeNotification\Default\System.Data.SqlXml,2.0.0.0,,b77a5c561934e089,MSIL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\ConfigMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\ConfigString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\MVID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\EvalationData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\Status
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\ILDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\NIDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NativeImagesIndex\v2.0.50727_32\NI\6faf58\19ab8d57\c2\MissingDependencies
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32\Class
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0\0\win32\(Default)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\DeviceDesc
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Control Panel\International\LocaleName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc}\00000007\00000000\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc}\00000007\00000000\Data
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\DeviceInstance
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutWave\Control\Linked
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{eb115ffc-10c8-4964-831d-6dcb02e6f23f}\DeviceInstance
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{EB115FFC-10C8-4964-831D-6DCB02E6F23F}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{eb115ffc-10c8-4964-831d-6dcb02e6f23f}\#eLineOutWave\Control\Linked
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Control\Linked
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\Capabilities
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\HDAUDIO\FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001\4&30BAF1DB&0&0001\ConfigFlags
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{840b8171-b0ad-410f-8581-cccc0382cfef}\00000000\00000000\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{6994AD04-93EF-11D0-A3CC-00A0C9223196}\##?#HDAUDIO#FUNC_01&VEN_1AF4&DEV_0022&SUBSYS_1AF40022&REV_1001#4&30BAF1DB&0&0001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\#eLineOutTopo\Properties\{840b8171-b0ad-410f-8581-cccc0382cfef}\00000000\00000000\Data
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-1339698970-4093829097-1161395185-1000\ProfileImagePath
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\S-1-5-21-1339698970-4093829097-1161395185-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR\Disable
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SystemSetupInProgress
HKEY_LOCAL_MACHINE\SYSTEM\Setup\UpgradeInProgress
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Settings\ActiveWriterStateTimeout
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\(Default)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Settings\TornComponentsMax
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM\ConfigValueEssNeedsLoading
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcSs\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\WOW64
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\Environment
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VaultSvc\RequiredPrivileges
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\DcomLaunch\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioSrv\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AeLookupSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\CryptSvc\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BFE\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\EventSystem\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AudioEndpointBuilder\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RpcEptMapper\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FDResPub\ObjectName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ErrorControl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Tag
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnService
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\DependOnGroup
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\Group
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PolicyAgent\ObjectName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\COM3\Com+Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\LocalService
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\DllSurrogate
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\RunAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\ActivateAtStorage
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\ROTFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\AppIDFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\LaunchPermission
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\LegacyAuthenticationLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\LegacyImpersonationLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\AuthenticationLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\RemoteServerName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\SRPTrustLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\PreferredServerBitness
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\LoadUserSettings
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F9717507-6651-4EDB-BFF7-AE615179BCCF}\AccessPermission
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\QHqFoFvd
advapi32.dll.RegOpenKeyExW
advapi32.dll.RegQueryInfoKeyW
advapi32.dll.RegEnumKeyExW
advapi32.dll.RegEnumValueW
advapi32.dll.RegCloseKey
advapi32.dll.RegQueryValueExW
kernel32.dll.FlsAlloc
kernel32.dll.FlsFree
kernel32.dll.FlsGetValue
kernel32.dll.FlsSetValue
kernel32.dll.InitializeCriticalSectionEx
kernel32.dll.CreateEventExW
kernel32.dll.CreateSemaphoreExW
kernel32.dll.SetThreadStackGuarantee
kernel32.dll.CreateThreadpoolTimer
kernel32.dll.SetThreadpoolTimer
kernel32.dll.WaitForThreadpoolTimerCallbacks
kernel32.dll.CloseThreadpoolTimer
kernel32.dll.CreateThreadpoolWait
kernel32.dll.SetThreadpoolWait
kernel32.dll.CloseThreadpoolWait
kernel32.dll.FlushProcessWriteBuffers
kernel32.dll.FreeLibraryWhenCallbackReturns
kernel32.dll.GetCurrentProcessorNumber
kernel32.dll.GetLogicalProcessorInformation
kernel32.dll.CreateSymbolicLinkW
kernel32.dll.SetDefaultDllDirectories
kernel32.dll.EnumSystemLocalesEx
kernel32.dll.CompareStringEx
kernel32.dll.GetDateFormatEx
kernel32.dll.GetLocaleInfoEx
kernel32.dll.GetTimeFormatEx
kernel32.dll.GetUserDefaultLocaleName
kernel32.dll.IsValidLocaleName
kernel32.dll.LCMapStringEx
kernel32.dll.GetTickCount64
kernel32.dll.AcquireSRWLockExclusive
kernel32.dll.ReleaseSRWLockExclusive
advapi32.dll.EventRegister
advapi32.dll.EventSetInformation
mscoree.dll.#142
mscoreei.dll.RegisterShimImplCallback
mscoreei.dll.OnShimDllMainCalled
mscoreei.dll._CorExeMain
shlwapi.dll.UrlIsW
version.dll.GetFileVersionInfoSizeW
version.dll.GetFileVersionInfoW
version.dll.VerQueryValueW
kernel32.dll.InitializeCriticalSectionAndSpinCount
kernel32.dll.IsProcessorFeaturePresent
msvcrt.dll._set_error_mode
[email protected]@[email protected]
kernel32.dll.FindActCtxSectionStringW
kernel32.dll.GetSystemWindowsDirectoryW
mscoree.dll.GetProcessExecutableHeap
mscoreei.dll.GetProcessExecutableHeap
user32.dll.GetProcessWindowStation
user32.dll.GetUserObjectInformationW
mscorwks.dll._CorExeMain
mscorwks.dll.GetCLRFunction
advapi32.dll.RegisterTraceGuidsW
advapi32.dll.UnregisterTraceGuids
advapi32.dll.GetTraceLoggerHandle
advapi32.dll.GetTraceEnableLevel
advapi32.dll.GetTraceEnableFlags
advapi32.dll.TraceEvent
mscoree.dll.IEE
mscoreei.dll.IEE
mscorwks.dll.IEE
mscoree.dll.GetStartupFlags
mscoreei.dll.GetStartupFlags
mscoree.dll.GetHostConfigurationFile
mscoreei.dll.GetHostConfigurationFile
mscoreei.dll.GetCORVersion
mscoree.dll.GetCORSystemDirectory
mscoreei.dll.GetCORSystemDirectory_RetAddr
mscoreei.dll.CreateConfigStream
ntdll.dll.RtlUnwind
kernel32.dll.IsWow64Process
advapi32.dll.AllocateAndInitializeSid
advapi32.dll.OpenProcessToken
advapi32.dll.GetTokenInformation
advapi32.dll.InitializeAcl
advapi32.dll.AddAccessAllowedAce
advapi32.dll.FreeSid
kernel32.dll.AddVectoredContinueHandler
kernel32.dll.RemoveVectoredContinueHandler
advapi32.dll.ConvertSidToStringSidW
shell32.dll.SHGetFolderPathW
kernel32.dll.GetWriteWatch
kernel32.dll.ResetWriteWatch
kernel32.dll.CreateMemoryResourceNotification
kernel32.dll.QueryMemoryResourceNotification
ole32.dll.CoInitializeEx
cryptbase.dll.SystemFunction036
kernel32.dll.QueryActCtxW
ole32.dll.CoGetContextToken
kernel32.dll.GetFullPathNameW
kernel32.dll.GetVersionExW
advapi32.dll.CryptAcquireContextA
advapi32.dll.CryptReleaseContext
advapi32.dll.CryptCreateHash
advapi32.dll.CryptDestroyHash
advapi32.dll.CryptHashData
advapi32.dll.CryptGetHashParam
advapi32.dll.CryptImportKey
advapi32.dll.CryptExportKey
advapi32.dll.CryptGenKey
advapi32.dll.CryptGetKeyParam
advapi32.dll.CryptDestroyKey
advapi32.dll.CryptVerifySignatureA
advapi32.dll.CryptSignHashA
advapi32.dll.CryptGetProvParam
advapi32.dll.CryptGetUserKey
advapi32.dll.CryptEnumProvidersA
mscoree.dll.GetMetaDataInternalInterface
mscoreei.dll.GetMetaDataInternalInterface
mscorwks.dll.GetMetaDataInternalInterface
mscorjit.dll.getJit
uxtheme.dll.IsAppThemed
kernel32.dll.CreateActCtxA
ole32.dll.CoTaskMemAlloc
ole32.dll.CoTaskMemFree
user32.dll.RegisterWindowMessageW
user32.dll.GetSystemMetrics
user32.dll.AdjustWindowRectEx
kernel32.dll.GetCurrentProcess
kernel32.dll.GetCurrentThread
kernel32.dll.DuplicateHandle
kernel32.dll.GetCurrentThreadId
kernel32.dll.GetCurrentActCtx
kernel32.dll.ActivateActCtx
kernel32.dll.lstrlen
kernel32.dll.lstrlenW
kernel32.dll.GetModuleHandleW
kernel32.dll.GetProcAddress
user32.dll.DefWindowProcW
gdi32.dll.GetStockObject
kernel32.dll.GetUserDefaultUILanguage
user32.dll.RegisterClassW
user32.dll.CreateWindowExW
user32.dll.SetWindowLongW
user32.dll.GetWindowLongW
user32.dll.CallWindowProcW
user32.dll.GetClientRect
user32.dll.GetWindowRect
user32.dll.GetParent
kernel32.dll.DeactivateActCtx
user32.dll.GetUserObjectInformationA
kernel32.dll.SetConsoleCtrlHandler
user32.dll.GetClassInfoW
user32.dll.SystemParametersInfoW
user32.dll.GetDC
kernel32.dll.GetCurrentProcessId
kernel32.dll.FindAtomW
kernel32.dll.AddAtomW
mscoree.dll.LoadLibraryShim
mscoreei.dll.LoadLibraryShim
gdiplus.dll.GdiplusStartup
user32.dll.GetWindowInfo
user32.dll.GetAncestor
user32.dll.GetMonitorInfoA
user32.dll.EnumDisplayMonitors
user32.dll.EnumDisplayDevicesA
gdi32.dll.ExtTextOutW
gdi32.dll.GdiIsMetaPrintDC
gdiplus.dll.GdipCreateFontFromLogfontW
kernel32.dll.RegOpenKeyExW
kernel32.dll.RegQueryInfoKeyA
kernel32.dll.RegCloseKey
kernel32.dll.RegCreateKeyExW
kernel32.dll.RegQueryValueExW
kernel32.dll.RegEnumValueW
mscoree.dll.ND_RI2
mscoreei.dll.ND_RI2
mscoree.dll.ND_RU1
mscoreei.dll.ND_RU1
gdiplus.dll.GdipGetFontUnit
gdiplus.dll.GdipGetFontSize
gdiplus.dll.GdipGetFontStyle
gdiplus.dll.GdipGetFamily
user32.dll.ReleaseDC
gdiplus.dll.GdipCreateFromHDC
gdiplus.dll.GdipGetDpiY
gdiplus.dll.GdipGetFontHeight
gdiplus.dll.GdipGetEmHeight
gdiplus.dll.GdipGetLineSpacing
gdiplus.dll.GdipDeleteGraphics
gdiplus.dll.GdipCreateFont
kernel32.dll.GetSystemDefaultLCID
gdi32.dll.GetObjectW
kernel32.dll.RegQueryInfoKeyW
gdiplus.dll.GdipDeleteFont
gdiplus.dll.GdipCreateFontFamilyFromName
gdiplus.dll.GdipGetFamilyName
gdi32.dll.CreateCompatibleDC
gdi32.dll.GetCurrentObject
gdi32.dll.SaveDC
gdi32.dll.GetDeviceCaps
gdi32.dll.CreateFontIndirectW
gdi32.dll.SelectObject
gdi32.dll.GetMapMode
gdi32.dll.GetTextMetricsW
user32.dll.DrawTextExW
gdi32.dll.GetLayout
gdi32.dll.GdiRealizationInfo
gdi32.dll.FontIsLinked
gdi32.dll.GetTextFaceAliasW
gdi32.dll.GetFontAssocStatus
advapi32.dll.RegQueryValueExA
user32.dll.MonitorFromRect
user32.dll.GetMonitorInfoW
gdi32.dll.CreateDCW
gdi32.dll.DeleteDC
user32.dll.GetDoubleClickTime
gdiplus.dll.GdipCreateBitmapFromStream
windowscodecs.dll.DllGetClassObject
gdiplus.dll.GdipImageForceValidation
gdiplus.dll.GdipGetImageRawFormat
gdiplus.dll.GdipGetImageWidth
gdiplus.dll.GdipGetImageHeight
gdiplus.dll.GdipCreateBitmapFromScan0
gdiplus.dll.GdipGetImagePixelFormat
gdiplus.dll.GdipGetImageGraphicsContext
user32.dll.GetSysColor
gdiplus.dll.GdipGraphicsClear
gdiplus.dll.GdipCreateImageAttributes
gdiplus.dll.GdipSetImageAttributesColorKeys
gdiplus.dll.GdipDrawImageRectRectI
gdiplus.dll.GdipDisposeImageAttributes
gdiplus.dll.GdipDisposeImage
kernel32.dll.SetErrorMode
kernel32.dll.GetFileAttributesExW
culture.dll.ConvertLangIdToCultureName
user32.dll.CreateIconFromResourceEx
gdiplus.dll.GdipGetLogFontW
mscoree.dll.ND_WU1
mscoreei.dll.ND_WU1
gdi32.dll.GetTextExtentPoint32W
user32.dll.GetCursorPos
user32.dll.MonitorFromPoint
gdiplus.dll.GdipLoadImageFromStream
gdiplus.dll.GdipGetImageType
gdiplus.dll.GdipBitmapGetPixel
kernel32.dll.GlobalMemoryStatusEx
kernel32.dll.SwitchToThread
kernel32.dll.OpenMutexW
kernel32.dll.CloseHandle
kernel32.dll.ReleaseMutex
kernel32.dll.CreateMutexW
kernel32.dll.CreateProcessW
kernel32.dll.GetThreadContext
kernel32.dll.ReadProcessMemory
kernel32.dll.VirtualAllocEx
kernel32.dll.WriteProcessMemory
kernel32.dll.SetThreadContext
kernel32.dll.ResumeThread
ole32.dll.CoWaitForMultipleHandles
user32.dll.SetClassLongW
user32.dll.PostMessageW
user32.dll.UnregisterClassW
user32.dll.IsWindow
sechost.dll.LookupAccountNameLocalW
user32.dll.DestroyWindow
kernel32.dll.DeleteAtom
gdi32.dll.RestoreDC
advapi32.dll.LookupAccountSidW
sechost.dll.LookupAccountSidLocalW
gdi32.dll.DeleteObject
user32.dll.DestroyIcon
cryptsp.dll.CryptAcquireContextW
cryptsp.dll.CryptGenRandom
ole32.dll.NdrOleInitializeExtension
ole32.dll.CoGetClassObject
ole32.dll.CoGetMarshalSizeMax
ole32.dll.CoMarshalInterface
ole32.dll.CoUnmarshalInterface
ole32.dll.StringFromIID
ole32.dll.CoGetPSClsid
ole32.dll.CoCreateInstance
ole32.dll.CoReleaseMarshalData
ole32.dll.DcomChannelSetHResult
rpcrtremote.dll.I_RpcExtInitializeExtensionPoint
kernel32.dll.CreateActCtxW
kernel32.dll.AddRefActCtx
kernel32.dll.ReleaseActCtx
cryptsp.dll.CryptReleaseContext
advapi32.dll.EventUnregister
bcrypt.dll.BCryptGetFipsAlgorithmMode
cryptsp.dll.CryptCreateHash
ole32.dll.CreateBindCtx
ole32.dll.CoGetObjectContext
ole32.dll.MkParseDisplayName
oleaut32.dll.#200
oleaut32.dll.#2
oleaut32.dll.#7
oleaut32.dll.#6
kernel32.dll.CreateEventW
kernel32.dll.SetEvent
ole32.dll.IIDFromString
kernel32.dll.LoadLibraryA
wminet_utils.dll.ResetSecurity
wminet_utils.dll.SetSecurity
wminet_utils.dll.BlessIWbemServices
wminet_utils.dll.BlessIWbemServicesObject
wminet_utils.dll.GetPropertyHandle
wminet_utils.dll.WritePropertyValue
wminet_utils.dll.Clone
wminet_utils.dll.VerifyClientKey
wminet_utils.dll.GetQualifierSet
wminet_utils.dll.Get
wminet_utils.dll.Put
wminet_utils.dll.Delete
wminet_utils.dll.GetNames
wminet_utils.dll.BeginEnumeration
wminet_utils.dll.Next
wminet_utils.dll.EndEnumeration
wminet_utils.dll.GetPropertyQualifierSet
wminet_utils.dll.GetObjectText
wminet_utils.dll.SpawnDerivedClass
wminet_utils.dll.SpawnInstance
wminet_utils.dll.CompareTo
wminet_utils.dll.GetPropertyOrigin
wminet_utils.dll.InheritsFrom
wminet_utils.dll.GetMethod
wminet_utils.dll.PutMethod
wminet_utils.dll.DeleteMethod
wminet_utils.dll.BeginMethodEnumeration
wminet_utils.dll.NextMethod
wminet_utils.dll.EndMethodEnumeration
wminet_utils.dll.GetMethodQualifierSet
wminet_utils.dll.GetMethodOrigin
wminet_utils.dll.QualifierSet_Get
wminet_utils.dll.QualifierSet_Put
wminet_utils.dll.QualifierSet_Delete
wminet_utils.dll.QualifierSet_GetNames
wminet_utils.dll.QualifierSet_BeginEnumeration
wminet_utils.dll.QualifierSet_Next
wminet_utils.dll.QualifierSet_EndEnumeration
wminet_utils.dll.GetCurrentApartmentType
wminet_utils.dll.GetDemultiplexedStub
wminet_utils.dll.CreateInstanceEnumWmi
wminet_utils.dll.CreateClassEnumWmi
wminet_utils.dll.ExecQueryWmi
wminet_utils.dll.ExecNotificationQueryWmi
wminet_utils.dll.PutInstanceWmi
wminet_utils.dll.PutClassWmi
wminet_utils.dll.CloneEnumWbemClassObject
wminet_utils.dll.ConnectServerWmi
wminet_utils.dll.GetErrorInfo
wminet_utils.dll.Initialize
oleaut32.dll.SysStringLen
kernel32.dll.RtlZeroMemory
ole32.dll.CoUninitialize
oleaut32.dll.#500
advapi32.dll.GetUserNameW
kernel32.dll.GetComputerNameW
kernel32.dll.GetEnvironmentVariableW
advapi32.dll.LookupPrivilegeValueW
advapi32.dll.AdjustTokenPrivileges
ntdll.dll.NtQuerySystemInformation
kernel32.dll.CreateDirectoryW
kernel32.dll.CopyFileW
advapi32.dll.RegSetValueExW
kernel32.dll.DeleteFileW
user32.dll.GetActiveWindow
ole32.dll.OleInitialize
ole32.dll.CoRegisterMessageFilter
user32.dll.EnumThreadWindows
user32.dll.IsWindowVisible
user32.dll.GetFocus
user32.dll.MessageBoxW
ole32.dll.CoRegisterInitializeSpy
ole32.dll.CoRevokeInitializeSpy
user32.dll.SendMessageW
kernel32.dll.CreateIoCompletionPort
kernel32.dll.PostQueuedCompletionStatus
ntdll.dll.NtQueryInformationThread
ntdll.dll.NtGetCurrentProcessorNumber
ole32.dll.CoCreateGuid
shfolder.dll.SHGetFolderPathW
kernel32.dll.FindFirstFileW
kernel32.dll.FindClose
kernel32.dll.FindNextFileW
kernel32.dll.CreateFileW
kernel32.dll.GetFileType
kernel32.dll.GetFileSize
kernel32.dll.ReadFile
oleaut32.dll.#204
oleaut32.dll.#203
oleaut32.dll.#179
kernel32.dll.GetACP
kernel32.dll.UnmapViewOfFile
kernel32.dll.GetSystemTimeAsFileTime
user32.dll.GetLastInputInfo
kernel32.dll.LocalFree
crypt32.dll.CryptUnprotectData
rpcrt4.dll.RpcStringBindingComposeW
rpcrt4.dll.RpcBindingFromStringBindingW
rpcrt4.dll.NdrClientCall2
cryptbase.dll.SystemFunction041
rpcrt4.dll.RpcStringFreeW
rpcrt4.dll.RpcBindingFree
cryptsp.dll.CryptHashData
cryptsp.dll.CryptGetHashParam
cryptsp.dll.CryptDestroyHash
vaultcli.dll.VaultEnumerateVaults
user32.dll.MsgWaitForMultipleObjectsEx
gdiplus.dll.GdipGetImageEncodersSize
kernel32.dll.LocalAlloc
gdiplus.dll.GdipGetImageEncoders
kernel32.dll.RtlMoveMemory
mscoree.dll.ND_WI4
mscoreei.dll.ND_WI4
gdiplus.dll.GdipGetDC
gdi32.dll.BitBlt
gdiplus.dll.GdipReleaseDC
gdiplus.dll.GdipSaveImageToStream
oleaut32.dll.#8
oleaut32.dll.#9
oleaut32.dll.#10
ole32.dll.CLSIDFromProgIDEx
sxs.dll.SxsLookupClrGuid
sxs.dll.SxsOleAut32RedirectTypeLibrary
advapi32.dll.RegOpenKeyW
advapi32.dll.RegQueryValueW
sxs.dll.SxsOleAut32MapConfiguredClsidToReferenceClsid
oleaut32.dll.#4
oleaut32.dll.#201
user32.dll.SetClipboardViewer
ole32.dll.OleGetClipboard
kernel32.dll.GlobalLock
kernel32.dll.GlobalUnlock
kernel32.dll.GlobalFree
user32.dll.SetWindowsHookExW
user32.dll.PeekMessageW
user32.dll.IsWindowUnicode
user32.dll.GetMessageW
user32.dll.TranslateMessage
user32.dll.DispatchMessageW
user32.dll.WaitMessage
kernel32.dll.GetTempPathW
kernel32.dll.SetFilePointer
kernel32.dll.WriteFile
vssapi.dll.CreateWriter
advapi32.dll.LookupAccountNameW
samcli.dll.NetLocalGroupGetMembers
samlib.dll.SamConnect
rpcrt4.dll.NdrClientCall3
samlib.dll.SamOpenDomain
samlib.dll.SamLookupNamesInDomain
samlib.dll.SamOpenAlias
samlib.dll.SamFreeMemory
samlib.dll.SamCloseHandle
samlib.dll.SamGetMembersInAlias
netutils.dll.NetApiBufferFree
samlib.dll.SamEnumerateDomainsInSamServer
samlib.dll.SamLookupDomainInSamServer
sechost.dll.ConvertSidToStringSidW
ole32.dll.CoTaskMemRealloc
advapi32.dll.RegisterEventSourceW
advapi32.dll.ReportEventW
advapi32.dll.DeregisterEventSource
ole32.dll.CLSIDFromOle1Class
clbcatq.dll.GetCatalogObject
clbcatq.dll.GetCatalogObject2
"{path}"
C:\Users\Louise\AppData\Local\Temp\zbuFITgIccG.exe "{path}"
C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
C:\Windows\system32\lsass.exe
Global\CLR_CASOFF_MUTEX
cfWAcmxykAeylXxNr
CicLoadWinStaWinSta0
Local\MSCTF.CtfMonitorInstMutexDefault1
VaultSvc

PE Information

Image Base Entry Point Reported Checksum Actual Checksum Minimum OS Version Compile Time Import Hash Icon Icon Exact Hash Icon Similarity Hash
0x00400000 0x00471396 0x00000000 0x000e1d5a 4.0 2020-06-22 02:29:08 f34d5f2d4577ed6d9ceec516c1f5a744 ffb4448032b3ac1ccda814c24d19f95a a811abc25a5091b7b04003fbc050f55d

Sections

Name RAW Address Virtual Address Virtual Size Size of Raw Data Characteristics Entropy
.text 0x00000200 0x00002000 0x0006f43c 0x0006f600 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 7.85
.rsrc 0x0006f800 0x00072000 0x0006a02c 0x0006a200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 4.78
.reloc 0x000d9a00 0x000de000 0x0000000c 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 0.10

Resources

Name Offset Size Language Sub-language Entropy File type
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_ICON 0x000db630 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL 4.50 None
RT_GROUP_ICON 0x000dba98 0x00000084 LANG_NEUTRAL SUBLANG_NEUTRAL 2.54 None
RT_VERSION 0x000dbb1c 0x00000324 LANG_NEUTRAL SUBLANG_NEUTRAL 3.27 None
RT_MANIFEST 0x000dbe40 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL 5.00 None

Imports


Assembly Information

Name oTfho
Version 1.0.0.0

Assembly References

Name Version
mscorlib 2.0.0.0
System.Windows.Forms 2.0.0.0
System 2.0.0.0
System.Drawing 2.0.0.0
Microsoft.VisualBasic 8.0.0.0

Custom Attributes

Type Name Value
Assembly [mscorlib]System.Reflection.AssemblyTitleAttribute VersiveProje
Assembly [mscorlib]System.Reflection.AssemblyProductAttribute VersiveProje
Assembly [mscorlib]System.Reflection.AssemblyCopyrightAttribute Copyright \xa9 20
Assembly [mscorlib]System.Runtime.InteropServices.GuidAttribute e18d6f71-62a1-4f88-9c11-4beabf6d24
Assembly [mscorlib]System.Reflection.AssemblyFileVersionAttribute 1.0.0

Type References

Assembly Type Name
mscorlib System.Runtime.CompilerServices.CompilationRelaxationsAttribute
mscorlib System.Runtime.CompilerServices.RuntimeCompatibilityAttribute
mscorlib System.Diagnostics.DebuggableAttribute
mscorlib System.Diagnostics.DebuggableAttribute/DebuggingModes
mscorlib System.Reflection.AssemblyTitleAttribute
mscorlib System.Reflection.AssemblyDescriptionAttribute
mscorlib System.Reflection.AssemblyConfigurationAttribute
mscorlib System.Reflection.AssemblyCompanyAttribute
mscorlib System.Reflection.AssemblyProductAttribute
mscorlib System.Reflection.AssemblyCopyrightAttribute
mscorlib System.Reflection.AssemblyTrademarkAttribute
mscorlib System.Runtime.InteropServices.ComVisibleAttribute
mscorlib System.Runtime.InteropServices.GuidAttribute
mscorlib System.Reflection.AssemblyFileVersionAttribute
mscorlib System.Object
System.Windows.Forms System.Windows.Forms.DialogResult
System.Windows.Forms System.Windows.Forms.MessageBoxButtons
mscorlib System.Enum
System.Windows.Forms System.Windows.Forms.Form
System.Windows.Forms System.Windows.Forms.PictureBox
System System.ComponentModel.IContainer
System.Windows.Forms System.Windows.Forms.ToolStrip
System.Windows.Forms System.Windows.Forms.ToolStripButton
System.Windows.Forms System.Windows.Forms.Panel
System.Windows.Forms System.Windows.Forms.ToolStripSplitButton
System.Windows.Forms System.Windows.Forms.ToolStripMenuItem
System.Windows.Forms System.Windows.Forms.ToolStripSeparator
System.Windows.Forms System.Windows.Forms.ToolStripLabel
System.Windows.Forms System.Windows.Forms.ToolStripTextBox
mscorlib System.EventArgs
System.Windows.Forms System.Windows.Forms.ToolStripItemClickedEventArgs
System.Windows.Forms System.Windows.Forms.MouseEventArgs
System.Drawing System.Drawing.Point
System.Drawing System.Drawing.Image
System.Windows.Forms System.Windows.Forms.KeyEventArgs
System.Windows.Forms System.Windows.Forms.PaintEventArgs
System System.ComponentModel.ComponentResourceManager
mscorlib System.STAThreadAttribute
System.Windows.Forms System.Windows.Forms.Label
System.Windows.Forms System.Windows.Forms.Button
mscorlib System.MulticastDelegate
mscorlib System.IAsyncResult
mscorlib System.AsyncCallback
mscorlib System.ValueType
System.Windows.Forms System.Windows.Forms.Keys
mscorlib System.Reflection.Assembly
mscorlib System.AppDomain
System System.Collections.Generic.Queue`1
mscorlib System.Nullable`1
System.Windows.Forms System.Windows.Forms.MenuStrip
System.Windows.Forms System.Windows.Forms.StatusStrip
System.Windows.Forms System.Windows.Forms.ToolStripStatusLabel
System.Windows.Forms System.Windows.Forms.ToolTip
System.Windows.Forms System.Windows.Forms.OpenFileDialog
System.Windows.Forms System.Windows.Forms.SaveFileDialog
mscorlib System.Collections.Generic.Dictionary`2
mscorlib System.Runtime.CompilerServices.CompilerGeneratedAttribute
mscorlib System.Diagnostics.DebuggerBrowsableState
mscorlib System.Diagnostics.DebuggerBrowsableAttribute
mscorlib System.Collections.Generic.List`1
mscorlib System.Random
mscorlib System.DateTime
System System.Diagnostics.Stopwatch
System System.CodeDom.Compiler.GeneratedCodeAttribute
mscorlib System.Diagnostics.DebuggerNonUserCodeAttribute
mscorlib System.Resources.ResourceManager
mscorlib System.Globalization.CultureInfo
System.Drawing System.Drawing.Bitmap
System System.ComponentModel.EditorBrowsableState
System System.ComponentModel.EditorBrowsableAttribute
mscorlib System.IO.File
mscorlib System.String
System.Windows.Forms System.Windows.Forms.MessageBox
mscorlib System.Array
mscorlib System.Int32
mscorlib System.Char
System.Windows.Forms System.Windows.Forms.Control
System.Windows.Forms System.Windows.Forms.MouseButtons
mscorlib System.Math
System.Drawing System.Drawing.SystemColors
System.Drawing System.Drawing.Color
System.Windows.Forms System.Windows.Forms.BorderStyle
System.Drawing System.Drawing.Size
System.Windows.Forms System.Windows.Forms.PictureBoxSizeMode
System.Windows.Forms System.Windows.Forms.MouseEventHandler
System.Windows.Forms System.Windows.Forms.Control/ControlCollection
System.Windows.Forms System.Windows.Forms.ToolStripItem
mscorlib System.IDisposable
mscorlib System.Type
mscorlib System.RuntimeTypeHandle
System.Drawing System.Drawing.Font
System.Windows.Forms System.Windows.Forms.ToolStripItemCollection
System.Windows.Forms System.Windows.Forms.ToolStripItemClickedEventHandler
System.Windows.Forms System.Windows.Forms.CheckState
System.Windows.Forms System.Windows.Forms.ToolStripItemDisplayStyle
System.Windows.Forms System.Windows.Forms.Padding
mscorlib System.EventHandler
System.Windows.Forms System.Windows.Forms.HorizontalAlignment
System.Windows.Forms System.Windows.Forms.KeyEventHandler
System.Windows.Forms System.Windows.Forms.ToolStripControlHost
System.Windows.Forms System.Windows.Forms.ToolStripDropDownItem
System.Windows.Forms System.Windows.Forms.DockStyle
System.Drawing System.Drawing.FontStyle
System.Drawing System.Drawing.GraphicsUnit
System.Windows.Forms System.Windows.Forms.ToolStripItemImageScaling
System.Windows.Forms System.Windows.Forms.TextImageRelation
System.Drawing System.Drawing.SizeF
System.Windows.Forms System.Windows.Forms.ContainerControl
System.Windows.Forms System.Windows.Forms.AutoScaleMode
System.Drawing System.Drawing.Icon
System.Windows.Forms System.Windows.Forms.FormStartPosition
System.Windows.Forms System.Windows.Forms.Application
System.Windows.Forms System.Windows.Forms.ImageLayout
System.Windows.Forms System.Windows.Forms.Cursors
System.Windows.Forms System.Windows.Forms.Cursor
System.Windows.Forms System.Windows.Forms.ButtonBase
System.Windows.Forms System.Windows.Forms.FlatButtonAppearance
System.Windows.Forms System.Windows.Forms.FlatStyle
System.Windows.Forms System.Windows.Forms.FormBorderStyle
System.Windows.Forms System.Windows.Forms.RightToLeft
Microsoft.VisualBasic Microsoft.VisualBasic.CompilerServices.LateBinding
mscorlib System.Environment
mscorlib System.Environment/SpecialFolder
System.Windows.Forms System.Windows.Forms.FileDialog
System.Windows.Forms System.Windows.Forms.CommonDialog
System.Windows.Forms System.Windows.Forms.IWin32Window
System.Windows.Forms System.Windows.Forms.MdiLayout
System System.ComponentModel.Container
System.Windows.Forms System.Windows.Forms.ToolStripLayoutStyle
mscorlib System.NotImplementedException
mscorlib System.Double
mscorlib System.Runtime.CompilerServices.RuntimeHelpers
mscorlib System.RuntimeFieldHandle
mscorlib System.Console

!This program cannot be run in DOS mode.
.text
`.rsrc
@.reloc
#.(+:
#.(+:
v2.0.50727
#Strings
#GUID
#Blob
__StaticArrayInitTypeSize=160
Nullable`1
Queue`1
SortedSet`1
List`1
frame1
_frameSize1
window_size1
toolStripLabel1
label1
panel1
ToolStripMenuItem1
ToolStripMenuItem1
ToolStripMenuItem1
toolStrip1
toolStripSeparator1
MDIParent1
Int32
Dictionary`2
frame2
_frameSize2
window_size2
toolStripLabel2
label2
get_CoreModel2
toolStripMenuItem2
toolStripSeparator2
toolStripSeparator3
toolStripSeparator4
toolStripLabel5
toolStripSeparator5
toolStripLabel6
toolStripSeparator6
toolStripLabel7
toolStripSeparator7
toolStripSeparator8
<Module>
<PrivateImplementationDetails>
9F6E8424AEDC3EE4E136A800BC166ACE250876E8B6697F4AD1242A58761ED2AB
CDCDCDCD
SizeF
System.IO
cell_backUP
AXAXAXAX
get_X
get_Y
value__
get_Magenta
get_Aqua
FromArgb
mscorlib
InputStreamStub
System.Collections.Generic
Microsoft.VisualBasic
CalculateDonesAndTotals_Statistic
deShowStatistic
add_Load
LabirintForm_Load
SokobanEditor_Load
get_Red
get_Checked
set_Checked
toolStrip1_ItemClicked
add_ItemClicked
set_DoubleBuffered
valid
<Min>k__BackingField
<Max>k__BackingField
get_Hand
get_Millisecond
method
get_ButtonFace
Place
Replace
FlatButtonAppearance
get_FlatAppearance
get_KeyCode
set_AutoScaleMode
set_SizeMode
PictureBoxSizeMode
RbTree
ShitToUpperTree
ShiftToLowTree
set_Image
AddRange
set_AllowMerge
EndInvoke
BeginInvoke
IDisposable
set_Visible
Double
RuntimeFieldHandle
RuntimeTypeHandle
GetTypeFromHandle
LevelFromFile
HowMuchLevelsInFile
OpenFile
Console
DockStyle
set_BorderStyle
set_FormBorderStyle
set_FlatStyle
FontStyle
set_LayoutStyle
ToolStripLayoutStyle
set_DisplayStyle
ToolStripItemDisplayStyle
set_Name
get_FileName
filename
Frame
DateTime
WriteLine
toolDone
toolNone
progressInLevel_done
HowMuchElementsOneType
ValueType
toolHere
CellToPicture
get_Culture
set_Culture
resourceCulture
ButtonBase
Close
Dispose
TryParse
Reverse
MulticastDelegate
DebuggerBrowsableState
EditorBrowsableState
set_CheckState
get_White
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
GeneratedCodeAttribute
DebuggerNonUserCodeAttribute
DebuggableAttribute
DebuggerBrowsableAttribute
EditorBrowsableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
_queue
Dequeue
Enqueue
get_RoyalBlue
get_Value
CheckValue
get_HasValue
newValue
value
toolSave
toRemove
oTfho.exe
set_Size
frameSize
set_ImageScalingSize
set_AutoSize
toolStripTextBoxMapSize
set_BorderSize
_targetSize
set_ClientSize
_currentSize
newLevel_size
add_Resize
LabirintForm_Resize
SokobanEditor_Resize
toolResize
get_Tag
set_Tag
Padding
LateBinding
set_ImageScaling
ToolStripItemImageScaling
ToString
toString
disposing
VersiveProject.Testing
System.Drawing
SaveFileDialog
OpenFileDialog
CommonDialog
ShowDialog
Stopwatch
BinaryMath
GetFolderPath
get_Width
changableNumberOFpicturesONwidth
numberOFpicturesONwidth
numberOfPBs_width
numberOfcells_width
GetLength
LayoutMdi
toolBack
AsyncCallback
callback
get_Black
toolStripLabel1_Click
label1_Click
add_Click
toolDone_Click
toolNone_Click
toolHere_Click
toolSave_Click
toolBack_Click
toolRestartLevel_Click
toolNextLevel_Click
toolPrevLevel_Click
toolWall_Click
toolResizeAdd1Col_Click
toolResizeDel1Col_Click
CascadeToolStripMenuItem_Click
PasteToolStripMenuItem_Click
TileVerticalToolStripMenuItem_Click
TileHorizontalToolStripMenuItem_Click
CloseAllToolStripMenuItem_Click
ToolBarToolStripMenuItem_Click
StatusBarToolStripMenuItem_Click
SaveAsToolStripMenuItem_Click
ArrangeIconsToolStripMenuItem_Click
CutToolStripMenuItem_Click
CopyToolStripMenuItem_Click
ExitToolsStripMenuItem_Click
toolUser_Click
toolResizeAdd5Cols_Click
toolResizeDel5Cols_Click
toolResizeAdd5Rows_Click
toolResizeDel5Rows_Click
buttonStart_Click
toolNext_Click
toolResizeAdd1Row_Click
toolResizeDel1Row_Click
toolBox_Click
pictureBox1_MouseDoubleClick
add_MouseDoubleClick
ShowCellAfterUserDecision_forDoubleClick
pictureBox1_MouseClick
add_MouseClick
set_CheckOnClick
toolStripButton1_ButtonClick
add_ButtonClick
toolResize_ButtonClick
set_Dock
get_ControlDark
numberOfPBs_width_global
numberOfPBs_height_global
get_Coral
progressInLevel_total
actual
ToolStripLabel
ToolStripStatusLabel
toolStripStatusLabel
System.ComponentModel
Panel
LoadLevel
IsGoodLevel
toolNumberOfTimeLevel
SaveLevel
ChangeSkeletonOfLevel
numberOfLevel
toolProgressInLevel
OpenLevel
InitLevel
toolCurrentLevel
currentLevel
toolRestartLevel
toolNextLevel
toolPrevLevel
ShowLevel
level
toolWall
SetUserDecisionCell
CharToCell
userdecision_cell
selectedcell
ContainerControl
ICheckableStream
RandomInputStream
inputStream
input_stream
Program
get_zhDAUxeJIcZpUBAuFFrFYRWcm
get_Item
set_Item
ToolStripDropDownItem
ToolStripItem
set_MdiWindowListItem
cascadeToolStripMenuItem
pasteToolStripMenuItem
saveToolStripMenuItem
searchToolStripMenuItem
tileVerticalToolStripMenuItem
tileHorizontalToolStripMenuItem
closeAllToolStripMenuItem
selectAllToolStripMenuItem
openToolStripMenuItem
redoToolStripMenuItem
undoToolStripMenuItem
printSetupToolStripMenuItem
toolBarToolStripMenuItem
statusBarToolStripMenuItem
saveAsToolStripMenuItem
arrangeIconsToolStripMenuItem
optionsToolStripMenuItem
contentsToolStripMenuItem
exitToolStripMenuItem
printToolStripMenuItem
cutToolStripMenuItem
aboutToolStripMenuItem
printPreviewToolStripMenuItem
newToolStripMenuItem
newWindowToolStripMenuItem
indexToolStripMenuItem
copyToolStripMenuItem
ToolStripMenuItem
ToolStripMenuItem
ToolStripMenuItem
ToolStripMenuItem
System
getRandom
WelcomeForm
get_ActiveForm
LabirintForm
ShowNewForm
resourceMan
get_Mean
_mean
get_Median
_median
MyStatsGen
get_MdiChildren
set_TextBoxTextAlign
get_Min
set_Min
AppDomain
get_CurrentDomain
set_Margin
width_min
height_min
set_Icon
ShowCellAfterUserDecision
Application
set_Location
user_location
set_TextImageRelation
System.Globalization
System.Reflection
ControlCollection
ToolStripItemCollection
set_StartPosition
FormStartPosition
get_ActiveCaption
NotImplementedException
get_Button
saveToolStripButton
openToolStripButton
helpToolStripButton
printToolStripButton
printPreviewToolStripButton
newToolStripButton
ToolStripSplitButton
add_KeyDown
toolStripTextBoxMapSize_KeyDown
LabirintForm_KeyDown
get_Brown
CultureInfo
oTfho
UserStepOnLevelMap
Bitmap
BasicVerifyOfStep
ToolTip
toolTip
ToolStrip
toolStrip
StatusStrip
statusStrip
set_MainMenuStrip
menuStrip
get_Desktop
Clear
CellToChar
childFormNumber
ReadLevelHeader
SpecialFolder
sender
get_ActiveBorder
get_ResourceManager
ComponentResourceManager
MeanTracker
_meanTracker
MedianMaxTracker
_medianMaxTracker
ToolStripItemClickedEventHandler
MouseEventHandler
KeyEventHandler
System.CodeDom.Compiler
IContainer
set_IsMdiContainer
upper
toolUser
set_Filter
get_Silver
lower
curr_level_nr
lastInCurrent_level_nr
set_ForeColor
set_BackColor
set_UseVisualStyleBackColor
set_MouseDownBackColor
set_MouseOverBackColor
set_BorderColor
set_ImageTransparentColor
set_Cursor
ToolStripSeparator
StatisticsGenerator
_generator
.ctor
.cctor
SokobanEditor
prj_s
Statistics
System.Diagnostics
DeleteMethods
notification_endplaces
System.Runtime.InteropServices
Microsoft.VisualBasic.CompilerServices
System.Runtime.CompilerServices
System.Resources
VersiveProject.MDIParent1.resources
prj_s.WelcomeForm.resources
prj_s.LabirintForm.resources
Editor.SokobanEditor.resources
VersiveProject.Properties.Resources.resources
DebuggingModes
VersiveProject.Properties
EnableVisualStyles
ReadAllLines
WriteAllLines
LoadPictures
InitPictures
deShowTextures
getValues
_values
notification_boxes
ToolStripItemClickedEventArgs
MouseEventArgs
PaintEventArgs
KeyEventArgs
get_ElapsedTicks
get_Controls
get_Items
get_DropDownItems
System.Windows.Forms
Contains
set_AutoScaleDimensions
CalculateFactsForNotifications
MouseButtons
MessageBoxButtons
get_Chars
RuntimeHelpers
SystemColors
Cursors
GameProccess
gameproccess
toolFactOfSuccess
TestHarness
printProgress
levelMap_UNmovedObjects
ShowMovedAndUNmovedObjects
levelUser_movedObjects
checkResults
components
set_ShortcutKeys
Concat
Format
GetObject
object
VersiveProject
LateGet
target
set_RightToLeft
get_Height
changableNumberOFpicturesONheight
numberOFpicturesONheight
numberOfPBs_height
numberOfcells_height
get_Highlight
Split
GraphicsUnit
SetCompatibleTextRenderingDefault
IAsyncResult
DialogResult
CheckResult
result
HorizontalAlignment
Environment
InitializeComponent
set_MdiParent
panel2_Paint
Point
set_Font
get_Count
_count
buttonStart
start
ToolStripControlHost
SuspendLayout
set_BackgroundImageLayout
ResumeLayout
MdiLayout
PerformLayout
toolNext
hasNext
getNext
get_Text
set_Text
get_ActiveCaptionText
set_ToolTipText
fileMenu
helpMenu
toolsMenu
windowsMenu
editMenu
viewMenu
set_KeyPreview
get_Now
IWin32Window
get_Window
doubleMouseClick_x
step_x
get_Max
set_Max
width_max
height_max
set_TabIndex
MessageBox
PictureBox
set_MaximizeBox
toolBox
ToolStripTextBox
doubleMouseClick_y
step_y
InitializeArray
ToArray
ToCharArray
get_Assembly
set_InitialDirectory
op_Inequality
Empty
WrapNonExceptionThrows
VersiveProject
Copyright
2018
$e18d6f71-62a1-4f88-9c11-4beabf6d2467
1.0.0.0
3System.Resources.Tools.StronglyTypedResourceBuilder
16.0.0.0
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
fSystem.Drawing.Icon, System.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3aBj
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Icon
IconData
IconSize
System.Drawing.Size
System.Drawing.Size
width
height
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
fSystem.Drawing.Icon, System.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3aBj
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Icon
IconData
IconSize
System.Drawing.Size
System.Drawing.Size
width
height
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
hSystem.Drawing.Bitmap, System.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3aPADPADM
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8Oc
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
tyw%9
m_,!8T
s+B/,{\
$Oi9{
.E)HH
Lech2(
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
tyw%9
m_,!8T
s+B/,{\
$Oi9{
.E)HH
Lech2(
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
Iu'[}gJ
{3T[2_
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
Iu'[}gJ
{3T[2_
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
XIDAT8O
o"OgE
)%<QEh|
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
XIDAT8O
o"OgE
)%<QEh|
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
WIDAT8O
2Rw[m
0Cwa&`Bt
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
/R=E(
aae-1
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
/R=E(
aae-1
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
*IDAT8O
Lc(eD
Y!QiQ
ZpT G
NpHvP
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
*IDAT8O
Lc(eD
Y!QiQ
ZpT G
NpHvP
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
/IDAT8O
]t[Sc8
bu/qx
-;d<n
lh:kF
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
/IDAT8O
]t[Sc8
bu/qx
-;d<n
lh:kF
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
$dX_wUFvC
><a`v
~FD\,
RcFJ.D
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
cHRM
IDAT8O
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
hSystem.Drawing.Bitmap, System.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3aPADPADC
!This program cannot be run in DOS mode.
.text
`.rsrc
@.reloc
,T&&&&&
,K&+#
*BSJB
v2.0.50727
#Strings
#GUID
#Blob
CoreModel.dll
CoreModel
<Module>
Setup
mscorlib
Object
System
PoweredByAttribute
SmartAssembly.Attributes
Attribute
QSQWDWD
QSQSQSQS
System.Drawing
Bitmap
WDWDW
DeleteSetup
CSCSC
SCSCSC
.ctor
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
AssemblyTitleAttribute
System.Reflection
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
Array
List`1
System.Collections.Generic
Image
get_Width
get_Size
get_Height
GetPixel
Color
FromArgb
op_Inequality
get_R
get_G
get_B
AddRange
IEnumerable`1
ToArray
String
Concat
Assembly
GetEntryAssembly
ResourceManager
System.Resources
GetObject
Thread
System.Threading
GetDomain
AppDomain
Microsoft.VisualBasic
Interaction
CallByName
CallType
Int32
Sleep
Environment
WrapNonExceptionThrows
CoreModel
Copyright
2020
$7813e2b4-ad0f-42b4-9c20-58765e008edd
1.0.0.0
#Powered by SmartAssembly 7.3.0.3296
_CorDllMain
mscoree.dll
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
IDATx^
?8_?|
o?uHw0`\
LF6mNf
*.=NdR
=}21m
R|;TS
D87DBX
=%bZ1
Q_'Em}{
0LXA3U
N~X<G
DbD5{
8W>M&q
#"]LC
I)mTK
q*-|1
,&k`)
]W(y8&
"t[zN
hXn%^/b
{[0hF{v
W"^S&
}kNrt'
t^UHq
%N8}`B
]&;rFc
KcP,=&
[;;LY
3I%=o
B?1s(4
Z4E=2
.~#m
|t+gv
n]xb&
_c.oR
[FlhG
7s>AkC
&/hgb
omRim
CYin(R
&U0,}
V-T|p
}_3 n`
_NqkH
/Y3kwv
\2XH~
8,D}]l;Q
a{u(/
nG0>G
?T_zD
=~&tv
er57~ib
aHi,O
enzUq
7a=>:
b]tz|
R$_-q3
!~-=,
Pl+%#0
,LCgE
O8w?;
~)D;~7
<0)YFH
&pmi(
7vJNr
g;rCK
O=^w&Ad
s<6LE
Q=oDs
u%Aw?
Ph*h;
:o0WNk
+_1*l3#
,*Y}o;
=%Rku
7[#M1
"+y7A
X'bg`NiE
4IyJk
F#K/N>X
O~a#mL
mcnu|
~e}=0
#^IOs
kn+v9
&''Q^
cWbdm
Jc|I=
xDkqM
9.}Et
5J|h%
{LR]}-
7"0k0
__1~_
)&Dx~ds
t|3/t|Q
t~R i
r us5
[p2[D
,2w&4
NeMY[R
o3.X\_E<K
.bsm!
^*tyH
0_N7x
~-CVk
y;TD`
K9;Gi
W&??t
S8:}y
8|'e1
eyX$=
[6%N?
>ru\{
k~\'n`
{eD-L
2zk7nl
=T4~b
JGskvgvN;
MPXot
CmI{r
""Kvc
x?k*tkE
=OY]4L;
~/Q1w)1m
Y#WG7
JZXYS
qM*d{
];["u
=5hjP
snVo$
;$"]dp
bz?=J
loT-4
\6xrU
Ge+']
HaGaK
!?BMp0
=zqBg/Y
7d!"F
AN|3.b
suiH,
{ GMdL
[(Crq0
Cc"$a4[c
0n5I%JD
fJg0m
nuBN}I
KGcBKf
MlY_8
=LD#2
*&*w4
-s*Z&
g2w`%
f#X:F
Q^/r%
M<1W=
|\\*0
D1P_J
UtzkN
)q~F|
p!]F{
L)N=m
"$r>?
HsxI/
5;6&3
Ci.{F
qg?rcWR
;`7}>
6`|i3N
RCzZ]`
5a7/l=h
k#P}RK
"~yS`m
tj.#5u>
ZJ]g9
*)#31
wb|Kt6_!
oKr'7
P/s$v
2d[R8
^F$L"8B
r,rCQ
UF`6a
w3`d[
|g4;6&
o1h>_
>b`eO
po8)z
G;v(m'E
'-gZo=
>f)?F
"bbr)?
>?Uyl
bmR+P
z0v_+
ONIyPc
$I?~m
U'qHI
7$poN
]dI8X
szpU#Z
y+5ImHi>
}yDzTO
vO;E?
vQ_cJ
5f"ns}
~"Eay
}w"rm4
]+jI=
L[w|{
CN?UC
y"K#l8
VdP#9CHj
!'YSi
tsiDh
czL%^
fJ}?_
g<K*9,
rVU-!gH
sOQY""
b0vac}
,C^5|A
DFec&l
#8v&5
m{X3=
;C&sl
&[1GD
}FTSi
t&x2\
/3>vG
V>8V;
--)wZ
s=MV_`
#}M':
WVeDd
RfpSG(
Ki\kN
zD~7#
ijf4"
Jj9*?
H-si*t
/,(nz
|3?H?
o3Rt<
/\i4}
O6Y0J
p-I{fq
-{G6dD
;h`[u
!8/YN
|Tw!wg_&%
[K>?Vfd
]djQS
Tc:y3
HOG]<
g=mN5
:|+K=O
|v#E>
:ANH^c
X~YOL^
)iR:<S"
gE}et
`7z?3
j)_^4
NDecaU
L(?N/
T)#wT'
Q.{ps
C/8:w
DRfJbxc
[b-Wp1.
&Bg~s}
")C[e
B!QC[R
BVHkpr
L:MmQ_
kK0w9
(f]"
kxU&'
vOa|v
Qg?'tL
k{s2U
y:s<?&O
h0]N&+
FwY1G
gPa,C[
jh)Zk
M4E]>
5_2v1
I]>v>
>?Jgm3
H'ok,
CHPI'|
=Yuo!
sIO},
E|#E|c
NeGF(
Fl<`B
aT'|~
)tRl$
Q]9L9
{E3)^
~Cev|\SC
ECF}V
ZgZ\-c
,E|cHUd
,~RKQ
@9mDI
&|MW%
#8n#E
[^.g^
~<n4[
YC#q}I
'bZj/
rS/bg
i_.SO+
p5d-m
NejW+Jp
!"?5\A
D71B<5
ZvWMW
5Z+6rmu
>T;]g
=B=]Fm
()-Zm`e
"*.<F
yd%gk
h}"7/,
\ma&H
MH+K"
PTrV]q#+
jV_!.i
v43+&LS
:}eBQ
Mg^Qa
Q^{nE
ZLDR<
YdWD|G
K#5V%[1ykGf
bBsrw
T'9Iz5
<6Mch
e\~hNX
Jc5^o
svN:iM{
vciJs
Q:l*k
%>vL&`
q|$}K
LU~99
j:wgj
G9KOf
B],uB
N)h[r
KzpkD
{Sh-'
ORuLouf
mNjxb
jq>|,G
BsRmW39
qWhYc
&rT^=
qjC~f
?5GmC9
X,d~j
t$DWJ
lcKgCAg
J?_3Y
LaGN(
[0m|$
{_q?S
pqDRq
}*/r5
2cV,]
.wC?J
t>\S\
xm&];ub
l6>?]x
[ysp&
ILX"}_
,#h|r
S`1z7f
HXvH$+m
$U9[#
/ctJc
dS6?]
TgIQc
<Y&s&Is
B]8||J
fAXu~
JuY(_
1U(x4
,dxS+9
LS6^y
3|Pg%
9 G1J
(.I91
1|[gv
?Gz3qe
x-2Wz
%yB1a
T~]|Afx7|
3%#8#yD
[P[9K$
}R]bV
w>D:\
]Xa72
c/qp\
gN;+~
w264gq
gXa#t&Q
!TRNfp$
K%BgZD
eb8+V
1Nt')g
}PlId
SZ #,
[ov>s
\D}+]BYwK
o,7ZnGwW4m
bVf]F
fq;G:
yY$g?
Tl*"eLw
F\9PF
.nz[s
BgG5;IW
>[a0p
O"dR2
f[K\"&
2'5+K
/NWp(u
EE?>Ut
A^P:?
[/.eLc
f/Fv4K
<v}CD=
Vr(s&ewV
w%9R)-3&p
|$grx
#MF|A
~kNN
3edLj
h(=f{
kQB?U
+cf^$v
KHI>E
h[3*D}
+K>[s
~*=]]p
=hZ{5
DSwW#
^Qa+t?
x8M:U
N%#aFc&
lYlMt
Gi~<v_
V4tUa~
(eYd~
4oUm9P
3$9$R+
I^YT#
~I#y.[l
$lT1'
CRdWR%
I+>qhu
Tt~eS
1A,S4
2^1}K>
<_1:\
WElC3VG="^j
o$+zY
t*hT0
;38m++z
J#i;W
]h;t0
N4;nM
pm9o>Vi
,aY{s
DKza^
NZMbi~
CTv]l
>X7<B
FWiY>
xK2Ql
mGF]Z
3~y`4
<jJ4+K
_V>tAa
>1V|l
w1"s1+
BGo}E=nk
Wnw,fM
FlWcf
y-x_7
J=8\[%
4RgG3
3Cr}R
~i5Ii
5:S'r
qS,@U
2W\l2t|g
KIujCg
[ho?NFSq
]@rv9g
Hz)YS
&2h7M
qU.mV
:;)Zx
E~%nc
`Im![
d6*%}
o)Eev\35g
wA4:#
<JXL-
f~g)=
#BEw1
CE6CT
R6K9fu
d9xS9
zV&Q=T
9u_ubW
Kli>^
IZ:y4-
*!cu}
BAP?~
4\nK9
upUL#
U)vG'
^2dP&?
35lD}
usn2d
[SN<p`
["%"s
&vA~:B
6.DNzEx
d3e|0
/#`m9
%W]6T?
Jk3s|-Fq}
HW\dC
$x|Crk
*qSdX
7[;F3
Vr\UBF
<_?~v
4]?=#P
*2&\;
s(18D
k5fa3Y
7gTc.
r*g;`
?0ec;
wq(M#
HJf5aCt/
\tK`Wa%
}[q*s
Z?0g[
{3?n*Q
2eDPW
4"g /
bgkf?>
W|%G4
XJ[A(e
oH$+c
#~.uLg
-^<i
MWsZ~
e,K6#.
3_hdZ_
[s1&9K
vw:q.p
D-AV;
^zy+N
?r(kU
>k{5"
ME&A~
siHPp
&=#I3qbR
lHuC[
AFZZk
}/W"t
\xgT#
Wb~du>H
c/S+3B
xSBwmE
'1)#Y8
sqY%O
qmR'j
:^E-*
4k_n%
4xwBN
gZC"w
_sAg?
=Voebm6j
KY}u8
C"xte
0^u-O
Tvc8c
C]w,k
i7#w/e
lG$f;
M,BN!;)
i &oTI
x6a&F
,/AnN$
~/Qv:V
;dgsp
3b#/X{
#Ag9s
rtOsx
FXmYE
vT\~3
e\+*cG
M5koGs0
";6&%!
W{21H
H2=dT
@.yXb}6
k#SvcH
3'#FD
4dv^.
Zf;<Q
YWIiQ
!lc;r>vdv
3yJc$
5]:Mt#
:1w{,
:g*ucg
-_pCO
aS7rh
f6I^w0
(2KdhT
Jx(gm
kV4Q!
paW~}
C'x='|
uTz=`
(vrSv
{r$iE
1|/v#waK6
.F}t"
kji>9f
UENOY02
_>x9*
MbCsD
D.OUN
%;lqk
]x-C>n
ys0#}
l"3#\H
[:/rfC
@KY,?
jak?X
5jf2_y
iF49Q
a.u&z]
k'zq^Q
B:48G
;%Ig)}j
7Bl(,
wHP$r}uTv:
S?$H[
!}!$G
Q%ovi
E[nVJy
;ZrigO
+GsU:
6`e[]
t\#M
n:]4nP
e~X_t
tn&?#wR
kNZ8+
:KdvCk"U
L$5=9Z-
DoPpb
Yd2s)
ddi5m
XVjW1
Tw>,<
NWLlw
1^Anh8
o"&B]
KnC/#
^`Id'
gE"-|
TAgGP~
r\o=
%N}Tp
b4Utvd!
,1#|fwz
_Ssj/[
%)y,[
h3FaE
WE3`N5
3aoxK\7_e
:\#EU[
M_^2n
mKh:u
!^z54W
&)C9"
o*:+Q
=X{p!.;
M:rl#
bX1{<
M0gDB
sMX3w
_SS_V'
Oxd\H
1%va;
*!wQ2
'jL8#(
Oh0d/=D|M
6GM:\{
V+fa0
34-p$#
:T`:X<`
dk^'l^G:
E6[_d
3~73{xs^
5W73m
$hMOE?
70&p(
rwig|
)rgUS
v=wT}
uku_u
|h<f;
_l_\IT
;?BPX8i
".F}*
!;.b,
O3Io|
G:0rG
+";\Z]
Jr7m&
"oW,?
kkX>?
~j\J9
E#9 )
#>^fe
{NUN=
'9)r6:-
w?Vw>
,yoBU
O_N^x'
nwEy&
z}y:{
#"![=
%n}xZ?
f$k;V
xf>3n
3JAWrt
X/N'H
[_s66i
Y>7:$
@>j&O
t{7S=
<W/V%
c<:X=
n1%Jl
\u*kU<MS\
OL?Wd
6$kve
z%_byX
Iz~$N
EbsM!^
}k=;\
loG|zf
jEcum
wuv9?h(
g1'kX&
{]9sg
%%PC|
PG~gFa{
?FS4c
,y_Ag*zP
Ht>ka
zTFs#
1KN1w
N+W3?;
F9v<W
!$ErF
zbC-D
zsWYC
K ?d6
2!hZ0
NQl}vS(
?>mfh
Z$00c=
YT3'L
et;2r/
(3fR9#
m;wdUj
'5%0e
XlVy,
UqWy>
3Al I
|5o|v Uu>
Zq!r6
%K!kDE
<_~<;gzt<
pM_jW
Sw>D:
RB[t'
uE$u[
A7NEu
d1{3{b:
!>_#U0!
!vu26
ISJ0J2c
&gM3~7
*J0_|
a`*~/]
(}9q}
w2fTZ
K7"W&"
CPU5`
7GpS;
BRm%nD
f/1,Vrk
oVu9e
+'I48M
hL5%5c
dNMOB
AAg1D
~W=dfX&
J&,-dV
{e0S77
t?tX<Ka,
o/\|s
FTtu+&
)vQ~o+[
pg,W"
;wT0E
(jhW:
73fa3
YA+Pm6
0B:xa
<{'B~
qyorD|
A-TDo
`r{*q
VKxc(
t\2w;
dZTc3b$e{
@^(SOG
4f<5"
Kx=n/
?_{kL[
YRk{[F
<f=QR'
If]5~
v4D^o%
.lMvG
'Q8b&
^X!('
d~Q7t
:e.d[
'x[O<{
M]EhT7d
Fa2twwf
X(,Qm
Z4Nm(
XFGrr
0ov/~
Zj?_}
}n.Wif
;2xP}
~?_uu
Q}9<n
CX{b)
XCkYcB
?Rm`O
z;fXM
Qf4Y|
.Zep=
#x~p3
VN<iV
#GlUA
8/9D~
TTxs#
r$L$T
]LBv&
0pg27
N3P{$^
'!tn?
~?_uux
$ZojO
?Lm.!
eiNey
aU-6njM?
Vo[2/i
w.`eH9
?)738
{)_:Wa
h>j}`ba
dkq,{,1
BRvf1
ct:d'
0{(ul
1{&*xp}
E|mg)
~A-[+
PE4#j
X{OL*'2
~?_uu(
{Aj&L
cxYf&~~[
4W>46
8VOPb
]\-&h
p&a#'Z
F(F((8
Lg[M7
^#GW5
"9=U3Q
LfWWN
Y.dy}T
\FiwC|<Zb
VBQ[D
&"!UJ
N4!5C
$ow=,
-srdI
*055`W
ubyGkL
+UN2jJs9n=
o<^qM:
T?\)
M8)tV'd
%BSu=R
nL2m+
7#kjs
b-G7K
1w#op{
Q%t{C
rw&<T
u;f`}y!
3oB3f|s`
pPD!_
8C\kHs
Deva,2
vDhx2m
[%x~U
Rp'\J
o9xZu*
q<MWO
Dv4RNf
D&3tE
&`{h!
q+RC6%
z><<9
uAsC2
W^&(/
R\$EZ
qX~ZN
"gb6k
9<x.=,
X5711
>X^ `T
dYU!yF
bo^W&Z
Z'qOm/
Fn&TOY
X1hA}l
DDhp^
tA3[Y
s#}\'~
W!&LU
F{-^M
\!kCri
+jy;j
SG|HW
k}%7`
R|};){?
r\+W`
dv'X)
\\FY#
BgvVn
?wfmgp
[j653N
Zp>!m
~StLx
[GdTo]II
R}O*k
cq#9>G
5N|V>
X=>5N
t +L7
`ot#G
sct0[
?Eb&&
X]:wSW
8g&.I!
G^m=f
12~99
|1G1w
hzt0g
yNULyP
$ADp7\
F!n<or
raU<y"
sZkxQ_
^$Y&rcj&
~s3o
Q ~/7
Ny;*{
9Bgoi(
yQbVO
cM86{
\X2d)?
E|wErn}#
R&FQ1z2
|65_M
\4y+b
n:nOp
(r/F`
=5*,0
*i'^?
%s9kQM
A,7YsJ
ds,+\
R::-e
o'ye0r
d\?Kt
0b>S&l
Z1Ru*
)wk$~7kb
T|w%j
{:'}b
',JCi
|c8M\
mtau'9
YBk4Xl
6^#~`?
]f%2K
v/!E}
2NHlW
/V"~/
9&wV O
LGAXf"
q3*`j
5KeGDOfMz
6'ze#
7=>0z
{Qhxi
]bu);3
#-b+K
,bZ}OJ
47/$a
("D|C
E\r|H
/FDu3a
I|YW)
%90D!
e4e4<
r:-cj
-ueB%#
eNYsTv
L_vY;
"^Hgs
{gLKgq6
oT?u#1L
(IiQ5
NmST#
E|wk^
]y?/]
2c %K
3t:gFX
8p5n-25y
yqI1)
7va<4
m^3v^=
8PtXBD
Rv&'W
+)'MO
,J|Rx
(Ux1*
SY=9{
T|ODiW
;na\(
Mi1F]
ivk&l
?-x?A$
yDvK'
0Qy3N
_8OzxSV)
}Di?"t
7u}>a
z2I"(
KH}hC
I^2/g
{>liEw
f{V g
}E{&i4bTF
rT8i5
u++c0/
6L3v`\
Q]h5Q
~%_86
)u%T9
f~M?"V
Vp:y9
kgY.v
UCF\k)F
K\Kl[l
|,[BfP
@U2Z{s
"YcJx
]-Hys%
[3vz%
}s84|*
IDATe
k&P-Ibc
7DsB.
^St>$Y
lU1M6
A!hM8
_AgB3b!
fg%B]|
Et7)=
&/n2rU/
$=N[Eb
=RFqnB[
O4i)-
wWC6+e
jpry0
d/u%o
fok%L
s[=lw_d
~?UI8,
o/AgW
wNPt>T?
:L~D1
R+d(U
/_e`](
H$&g;
r"*Z2K
H"tE|o
Vn?n{
}u}~b
[o6ul
*WNywT
:ANgg
OWt>t
}{Zqqlc
=ClS1
*G.|K
_IL~5-,
sp5o|_
{GRWV
c0d)q
]LT^A
~6#|c
/km6T
H$oc-
%wo[<
"3|##
9|ydA]
m}^2|h
-Em]N
{`1_g
(Ag#X
cTCZj8
J\28w
qat8?g^
kv0g4\
@ef/*
Qm{~\
F}O29A
^v3~D
Okth~
rVg:F'{*:
q;*&5
2b,TY>
yGE[]z
`W0)Y"
w|3U,
K5L>J'
]Vt>\
2AGWh
IrnKj
4KYAF
Jlp>V
SN<;F
XAgu|
6)+'@
yXMO$r
3#Ag7
pay<&
$O=Ko^w[
qWw><
EF-Ocd
a\@bU
XAg'Y
,/#NZ
cl]ZA
oD{[mA
QRjETOg
uB~>[
3]D|?
[L"jx
bw>U&
V2yr>
}W``x
e%aift
Nv+30r
^KE|[R
q!kH)M
5c<+1
d>Ui.
hq*w>!
`ZBCb
-xML$2E
/Q(]g
o'_UgCj
uxt(g
c}BD|
<(^iO
-f_tgb=z
x~dfA
Ie%q*
@(/#*
+na#)
D9MgSd
#l'j2w
eTi:#
T!arP0
4ZrgH
\TN'5|
Ci_U_g8
xjfa"
(r1mt
wkV_j
2ARA}
Iw:d4
LC>dd
zx GFD
4lnH|
Ul`_P,
HV4Og}Y6E
MEw\gn
Q~wj{
el*/$
9Ctw[r\
6dosA
>.qbh
gvr*}
^x-9G
{}cBE|k
<1(\O
;3ai4
"A)gE
GpnU2#
.fSx3
r<erC
*tm<9\*
.+/<D
eZ-;+6T;
+`0q.
@Wr{U
nvU28RA
i]W\r
1zf1s~VR
Nlnzp
U|J\C
jMyx<
Wn3Bo
fc+Ni
_:nv|
r<+"T
arjN_
T~$|I
O3I4W
R[VQ,
qe|,<F
%PHis
st^=F}
w?X`b
!9eFDzha:8
f!%P0
| .+~
Ry>XqB
>/hk4
L9>b,
"[P='
OW%/s
"ft_&
D|Cujx
L,{b2
0Z!UO
WpmpC4
')A-z
dJEn$V
y,_E"
X0?t+
a'xwz+5K
$Ag#vZP
,&DljR
49FBU
DZ=~D
'K3N]
'U_o{S
smNs~
Wv;vFig
p,zCW2
BjO%/
[Ux6zL
w|FNf
%LvoL
v,_M&s
;MD5KOu
~xE6!
%qv}8oG
Jnr>S
s6gW.
CB0Zp
OIXqC
pW[ft
W v!:8t[
f*?e=o
yFgAg
*:7jN
2=|r/
.eg;s
-zR:#
Mq.ahX[b'
kWu=_
[Cm\;2\
~l5P}
Hfj>6
i";rj
=B6f1o
'UPbb
pa%ao
%M&>c
M#8b%
&Q}r'n
coD(iq
nJ]^(
k+&u|H
g'%lP
;E|&A
E{`z9==
dQ.51
bepSF
aMbL-
*$|*)@
v8Ynr
meNbb
w*q8"
'.7mI
r1U{s
Z;itw"-
QVqp[
sz|'t
~7y}l:
g(BZsDd
gW3<q&
m;7aT
}(t3V
tyT2P
u;EFr
ZN/Dv
BFVP+
#s_?^
~zw~Y
DdWMX
=^n#o
[?%eV}t
Hx]O>
c+&-YK
G9Z;tyqD
]$b0v
&vz:>K%l9
Mx'c^
qvSWR
_ck`F
U](>=
dm#^]
efr&D.&
nm).q!
ma}\7
_Z1jQCN
/X{^B
=Do(c
d8tue
5W71e
8ZaAp
&N4{t
yWtN~
<^,&)
9}vwg
}J]V0
&SvOJ
2|b{#
WHBMc
_X8RNq
tfx>'
JW!_e
#o=#]?
7Gf2(
IDAT+
U;>Hn
Klv5`
[o)Bg
e$C\/
M-&7y)
x-\*' _
09/E|="|
{gZ+m(
M>(5-
-g(uy
N$y6Bb'
(^>t%
1d&W{
>8lBi
ad+>2
D|[`5
G~aQV<^
wr6'p
h:jw'8.
PV9a#
vGY(%kv
W_0hLO
!,Ll/tv
4'^w&
~HJ9.
Krio|
gU!X-
A]O3"
\DoF+>
v)1G7
Sy:d'
@7EBH
Y,!qf
su3B[
a=H\r
oXyb:G/+p
/UqCHN
Q&5aAb
LMSR#
_eb;|
1Sw^%
n{I:t
|k6v<
9[Dv0
+pkkC
dw,IU
=gm03o
FT|/\
)1lUu
!d|{u/
D(2SdhD
}"yr%
pz6oDo
of>7(
;YAg?
?H*.#%s'
'6eTq{
`ji>UF3
.3'+o!
*ej?E
ab=Wb
1ekGz}
_kzkdsB
u8sgmb
>S9y,j
dyHc'
;E3rY
w2;_av
}KK~y
28nM[
$_;sE
HfZuT
{CAgy
~gwD?~&
cGoS:F
ISzN2&
rsg~(
|= ac
K$lU
#x9j/
!Wg\a<
LwMTn2.7
}P#|N
Wrijd
-aO\c:'
]y"SA2ZF
K(^HJ
U_a$;
W4jfA
s5Tv;
oi8[$
n=y!I
3eHR'
lTvFh
\ZD|bK
cV"Oo
['cj\(
IdF6rSEm
%%ud8
a^^k,
|rTt^}e
r)qWc
}m3aWhS
B]L>dK
_sxQc
rj-RK
|Dv`7Bj
%n!)0
5:?(G2
qpN,z
tnMlC;
zfC,#
fM!K+
$IHiY
#vp {2:
2yg!R
U760p{
K?fQ{
$gNUv&>?
<t*B"$
gd;BY
Ch~1"
,%< N
},Uz>hg{
'n_i_
m:c?,
F.Hi9
&?3bo
TDtSo
;7hq`
~CST2
aLqh#
vS"V_
2tn8.
M94j+
~sKGb
ZAyA#
Ag:W
&PGFH
#y ngM
c5d,9
#{wgjoKn50
ZK|So
u1{IVl:
vzq|c
b4:eF
s s[<
LMp"FE
bCOv%,D
V~rR:
wf }b
Gpi_<[
R+l^px
|{.C-
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
fSystem.Drawing.Icon, System.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3aBj
QSystem.Drawing, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Icon
IconData
IconSize
System.Drawing.Size
System.Drawing.Size
width
height
_CorExeMain
mscoree.dll
DC?wIHC
awwvexxwewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvewwvevvueqqpehhgR***
kict
mket
mkft
nlft
nlgt
omht
omht
pnit
pnit
qojt
qojt
rpkt
rplt
sqlt
sqmt
trnt
tsnt
usot
utot
vtpt
vuqt
wuqt
wvrt
xvst
xwst
ywtt
yxtt
zyut
zyvt
{yvt
{zwt
|{wt
|{xt
||yt
}|yt
~}zt
~}{t
~~{t
)))L
Mccb1IIH
(ssrNbb`Xba`Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_Xa`_X]]]XMMLQ
.eedH^^^H^]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H^]\H]]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H^]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H]]\H^]\H]]\H]]\H]]\HXXWH///(
TSNrmkf
..-Rdc^?cb^g`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q`_[q^]XkTSN6
#" y|zv
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD
levels.txt
Segoe UI
toolStrip1
toolWall
toolBox
toolHere
toolDone
toolNone
toolUser
toolStripSeparator5
toolStripTextBoxMapSize
toolResize
(Enter)/
ToolStripMenuItem
ToolStripMenuItem
toolStripSeparator3
toolStripMenuItem2
ToolStripMenuItem1
toolStripSeparator1
ToolStripMenuItem
ToolStripMenuItem1
toolStripSeparator2
ToolStripMenuItem
ToolStripMenuItem1
toolStripSeparator4
toolSave
toolStripSeparator6
toolBack
toolNext
toolStripSeparator7
toolStripLabel1
toolStripSeparator8
panel1
notification_boxes
notification_endplaces
$this.Icon
SokobanEditor
SuperSokoban
Microsoft Sans Serif
label1
v.0.8.1
Adobe Heiti Std R
buttonStart
Start
TatianaC
label2
WelcomeForm
SuperSokoban
toolPrevLevel
toolStripButton1
toolNextLevel
toolStripButton2
toolCurrentLevel
toolStripLabel2
toolProgressInLevel
toolStripLabel7
toolNumberOfTimeLevel
toolRestartLevel
toolStripButton3
(Esc)
toolStripLabel5
toolStripLabel6
toolFactOfSuccess
LabirintForm
zhDAUxeJIcZpUBAuFFrFYRWcm
epy TteG
CoreModel.Setup
doht eMteG
Delet eSetup
eko vnI
VersiveProject
Window
Text Files (*.txt)|*.txt|All Files (*.*)|*.*
menuStrip
MenuStrip
fileMenu
&File
newToolStripMenuItem.Image
newToolStripMenuItem
openToolStripMenuItem.Image
openToolStripMenuItem
&Open
saveToolStripMenuItem.Image
saveToolStripMenuItem
&Save
saveAsToolStripMenuItem
Save &As
printToolStripMenuItem.Image
printToolStripMenuItem
&Print
printPreviewToolStripMenuItem.Image
printPreviewToolStripMenuItem
Print Pre&view
printSetupToolStripMenuItem
Print Setup
exitToolStripMenuItem
E&xit
editMenu
&Edit
undoToolStripMenuItem.Image
undoToolStripMenuItem
&Undo
redoToolStripMenuItem.Image
redoToolStripMenuItem
&Redo
cutToolStripMenuItem.Image
cutToolStripMenuItem
copyToolStripMenuItem.Image
copyToolStripMenuItem
&Copy
pasteToolStripMenuItem.Image
pasteToolStripMenuItem
&Paste
selectAllToolStripMenuItem
Select &All
viewMenu
&View
toolBarToolStripMenuItem
&Toolbar
statusBarToolStripMenuItem
&Status Bar
toolsMenu
&Tools
optionsToolStripMenuItem
&Options
windowsMenu
&Windows
newWindowToolStripMenuItem
&New Window
cascadeToolStripMenuItem
&Cascade
tileVerticalToolStripMenuItem
Tile &Vertical
tileHorizontalToolStripMenuItem
Tile &Horizontal
closeAllToolStripMenuItem
C&lose All
arrangeIconsToolStripMenuItem
&Arrange Icons
helpMenu
&Help
contentsToolStripMenuItem
&Contents
indexToolStripMenuItem.Image
indexToolStripMenuItem
&Index
searchToolStripMenuItem.Image
searchToolStripMenuItem
&Search
aboutToolStripMenuItem
&About ... ...
toolStrip
ToolStrip
newToolStripButton.Image
newToolStripButton
openToolStripButton.Image
openToolStripButton
saveToolStripButton.Image
saveToolStripButton
printToolStripButton.Image
printToolStripButton
Print
printPreviewToolStripButton.Image
printPreviewToolStripButton
Print Preview
helpToolStripButton.Image
helpToolStripButton
statusStrip
StatusStrip
toolStripStatusLabel
Status
MDIParent1
Progress: {0} elements processed
From {0} to {1} {2} should be {3} but is {4}
median
VersiveProject.Properties.Resources
CoreModel2
$this.Icon
$this.Icon
copyToolStripMenuItem.Image
cutToolStripMenuItem.Image
helpToolStripButton.Image
indexToolStripMenuItem.Image
newToolStripButton.Image
newToolStripMenuItem.Image
openToolStripButton.Image
openToolStripMenuItem.Image
pasteToolStripMenuItem.Image
printPreviewToolStripButton.Image
printPreviewToolStripMenuItem.Image
printToolStripButton.Image
printToolStripMenuItem.Image
redoToolStripMenuItem.Image
saveToolStripButton.Image
saveToolStripMenuItem.Image
searchToolStripMenuItem.Image
undoToolStripMenuItem.Image
CoreModel2
zhDAUxeJIcZpUBAuFFrFYRWcm
j.#s.+
.Cs.K
.Properties.Resources
EntryPoint
Invoke
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
CoreModel
FileVersion
1.0.0.0
InternalName
CoreModel.dll
LegalCopyright
Copyright
2020
LegalTrademarks
OriginalFilename
CoreModel.dll
ProductName
CoreModel
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
$this.Icon
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
VersiveProject
FileVersion
1.0.0.0
InternalName
oTfho.exe
LegalCopyright
Copyright
2018
LegalTrademarks
OriginalFilename
oTfho.exe
ProductName
VersiveProject
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0

Full Results

Engine Signature Engine Signature Engine Signature
Bkav Clean MicroWorld-eScan Clean FireEye Generic.mg.18e77defd5d83d42
CAT-QuickHeal Clean McAfee Clean Cylance Clean
VIPRE Clean SUPERAntiSpyware Clean Sangfor Malware
K7AntiVirus Clean Alibaba Clean K7GW Clean
Cybereason malicious.146802 Invincea Clean BitDefenderTheta Gen:[email protected]!T2ym
Cyren Clean Symantec Clean ESET-NOD32 Clean
Baidu Clean APEX Malicious Avast Clean
ClamAV Clean Kaspersky UDS:DangerousObject.Multi.Generic BitDefender Clean
NANO-Antivirus Clean Paloalto Clean ViRobot Clean
Rising Clean Endgame malicious (high confidence) Sophos Clean
Comodo Clean F-Secure Clean DrWeb Clean
Zillya Clean TrendMicro Clean Fortinet Clean
Trapmine Clean CMC Clean Emsisoft Clean
SentinelOne Clean F-Prot Clean Jiangmin Clean
eGambit Unsafe.AI_Score_99% Avira Clean MAX Clean
Antiy-AVL Clean Kingsoft Clean Arcabit Clean
AegisLab Clean AhnLab-V3 Clean ZoneAlarm UDS:DangerousObject.Multi.Generic
Avast-Mobile Clean Microsoft Trojan:Win32/Sonbokli.A!cl Cynet Clean
TotalDefense Clean Acronis Clean VBA32 Clean
ALYac Clean TACHYON Clean Ad-Aware Clean
Malwarebytes Spyware.AgentTesla Zoner Clean TrendMicro-HouseCall Clean
Tencent Clean Yandex Clean Ikarus Clean
MaxSecure Trojan.Malware.300983.susgen GData Clean Webroot Clean
AVG Clean Panda Clean CrowdStrike Clean
Qihoo-360 Clean
Sorry! No behavior.

Hosts

Direct IP Country Name
Y 8.8.8.8 [VT] United States
Y 1.1.1.1 [VT] Australia

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.1.9 51751 1.1.1.1 53
192.168.1.9 53599 1.1.1.1 53
192.168.1.9 54609 1.1.1.1 53
192.168.1.9 55233 1.1.1.1 53
192.168.1.9 55319 1.1.1.1 53
192.168.1.9 59058 1.1.1.1 53
192.168.1.9 59225 1.1.1.1 53
192.168.1.9 64674 1.1.1.1 53
192.168.1.9 137 192.168.1.255 137
192.168.1.9 51751 8.8.8.8 53
192.168.1.9 53599 8.8.8.8 53
192.168.1.9 54609 8.8.8.8 53
192.168.1.9 55233 8.8.8.8 53
192.168.1.9 55319 8.8.8.8 53
192.168.1.9 59058 8.8.8.8 53
192.168.1.9 59225 8.8.8.8 53
192.168.1.9 64674 8.8.8.8 53

DNS

No domains contacted.

HTTP Requests

No HTTP requests performed.

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

ICMP traffic

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Suricata HTTP

No Suricata HTTP

Sorry! No dropped Suricata Extracted files.

JA3

No JA3 hashes found.

Sorry! No dropped files.
Sorry! No CAPE files.
Process Name dllhost.exe
PID 3728
Dump Size 9728 bytes
Module Path C:\Windows\sysnative\dllhost.exe
Type PE image: 64-bit executable
PE timestamp 2009-07-13 23:59:16
MD5 16cf845f76271e3b735926bad63ba5f2
SHA1 c20713bfabf13ebc891d49c556abfa4b53d0ca0e
SHA256 1e1fb57546e335f49a413f4134eec98af7773949cd9276d911e51db680dc5ddb
CRC32 4081D589
Ssdeep 192:rLvDNvZq/dZlDUheFTgcgmbfmMsvCFWKz5W:fvDNvGkgFTgsKMFWKz5W
Dump Filename 1e1fb57546e335f49a413f4134eec98af7773949cd9276d911e51db680dc5ddb
Download Download Zip
Process Name services.exe
PID 472
Dump Size 327680 bytes
Module Path C:\Windows\sysnative\services.exe
Type PE image: 64-bit executable
PE timestamp 2015-04-13 02:02:59
MD5 9ae29bbf9637ba937abef382218fcf9d
SHA1 2c959801b70854ec77c341c47b3f6aea7e89e538
SHA256 7ab64780a5247f4ea1da4d633b3ba70cf62bcc81df62fbebd6dad568d77ec553
CRC32 B19D1EC7
Ssdeep 6144:YX+dGqMuImU4Zkt8kjM7vFLFb/2JBH4EtLcN8ZE21udxLIZm:YX+dGluImU4s8m/zMzI
Dump Filename 7ab64780a5247f4ea1da4d633b3ba70cf62bcc81df62fbebd6dad568d77ec553
Download Download Zip
Defense Evasion Credential Access Collection Privilege Escalation Persistence
  • T1116 - Code Signing
    • Signature - invalid_authenticode_signature
  • T1055 - Process Injection
    • Signature - InjectionInterProcess
  • T1045 - Software Packing
    • Signature - packer_entropy
  • T1003 - Credential Dumping
    • Signature - infostealer_browser
  • T1081 - Credentials in Files
    • Signature - infostealer_browser
  • T1005 - Data from Local System
    • Signature - infostealer_browser
  • T1055 - Process Injection
    • Signature - InjectionInterProcess
  • T1060 - Registry Run Keys / Startup Folder
    • Signature - persistence_autorun

    Processing ( 9.565999999999999 seconds )

    • 6.791 BehaviorAnalysis
    • 1.033 Static
    • 0.454 CAPE
    • 0.372 VirusTotal
    • 0.247 static_dotnet
    • 0.199 NetworkAnalysis
    • 0.132 Deduplicate
    • 0.117 Dropped
    • 0.091 TargetInfo
    • 0.039 ProcDump
    • 0.037 AnalysisInfo
    • 0.029 Strings
    • 0.012 peid
    • 0.011 Debug
    • 0.002 Suricata

    Signatures ( 3.9379999999999957 seconds )

    • 0.544 antiav_detectreg
    • 0.201 infostealer_ftp
    • 0.19 territorial_disputes_sigs
    • 0.168 stealth_timeout
    • 0.157 decoy_document
    • 0.145 api_spamming
    • 0.139 mimics_filetime
    • 0.139 NewtWire Behavior
    • 0.1 infostealer_im
    • 0.088 antianalysis_detectreg
    • 0.084 Doppelganging
    • 0.082 antivm_generic_disk
    • 0.081 masquerade_process_name
    • 0.076 antiav_detectfile
    • 0.071 PlugX
    • 0.071 antianalysis_detectfile
    • 0.061 virus
    • 0.059 stealth_file
    • 0.059 antivm_vbox_keys
    • 0.058 antivm_vbox_files
    • 0.057 reads_self
    • 0.052 bootkit
    • 0.05 injection_createremotethread
    • 0.047 infostealer_bitcoin
    • 0.042 InjectionCreateRemoteThread
    • 0.042 infostealer_mail
    • 0.039 antivm_parallels_keys
    • 0.032 hancitor_behavior
    • 0.031 injection_runpe
    • 0.03 InjectionInterProcess
    • 0.03 dynamic_function_loading
    • 0.03 qulab_files
    • 0.029 antiemu_wine_func
    • 0.028 antivm_vmware_keys
    • 0.027 InjectionProcessHollowing
    • 0.027 antivm_xen_keys
    • 0.026 malicious_dynamic_function_loading
    • 0.025 kovter_behavior
    • 0.025 antidbg_devices
    • 0.025 antivm_generic_diskreg
    • 0.022 Vidar Behavior
    • 0.021 InjectionSetWindowLong
    • 0.021 betabot_behavior
    • 0.021 infostealer_browser_password
    • 0.021 neshta_files
    • 0.019 antidbg_windows
    • 0.017 antidebug_guardpages
    • 0.017 antivm_generic_scsi
    • 0.017 exploit_heapspray
    • 0.017 predatorthethief_files
    • 0.016 shifu_behavior
    • 0.016 ransomware_files
    • 0.015 hawkeye_behavior
    • 0.015 network_tor
    • 0.015 geodo_banking_trojan
    • 0.013 injection_explorer
    • 0.013 stack_pivot
    • 0.013 antivm_vbox_devices
    • 0.013 antivm_vpc_keys
    • 0.012 antivm_xen_keys
    • 0.011 exploit_getbasekerneladdress
    • 0.011 h1n1_behavior
    • 0.011 antivm_hyperv_keys
    • 0.011 ransomware_extensions
    • 0.01 TransactedHollowing
    • 0.01 antisandbox_sleep
    • 0.01 kibex_behavior
    • 0.01 rat_luminosity
    • 0.009 blackrat_registry_keys
    • 0.009 recon_programs
    • 0.009 antivm_vmware_files
    • 0.009 bypass_firewall
    • 0.008 exec_crash
    • 0.008 exploit_gethaldispatchtable
    • 0.008 stack_pivot_file_created
    • 0.008 antivm_generic_bios
    • 0.007 antivm_generic_services
    • 0.007 persistence_autorun
    • 0.007 OrcusRAT Behavior
    • 0.006 antivm_vbox_libs
    • 0.006 antivm_generic_system
    • 0.005 antiav_avast_libs
    • 0.005 infostealer_browser
    • 0.005 antisandbox_fortinet_files
    • 0.005 antisandbox_threattrack_files
    • 0.005 network_tor_service
    • 0.005 recon_fingerprint
    • 0.004 antisandbox_sunbelt_libs
    • 0.004 uac_bypass_eventvwr
    • 0.004 encrypted_ioc
    • 0.004 kazybot_behavior
    • 0.004 vawtrak_behavior
    • 0.004 antisandbox_cuckoo_files
    • 0.004 antisandbox_joe_anubis_files
    • 0.004 antisandbox_sunbelt_files
    • 0.004 ketrican_regkeys
    • 0.004 codelux_behavior
    • 0.004 darkcomet_regkeys
    • 0.004 limerat_regkeys
    • 0.004 rat_pcclient
    • 0.004 sniffer_winpcap
    • 0.003 Unpacker
    • 0.003 antiav_bitdefender_libs
    • 0.003 antiav_emsisoft_libs
    • 0.003 antiav_apioverride_libs
    • 0.003 antiav_nthookengine_libs
    • 0.003 antisandbox_sboxie_libs
    • 0.003 tinba_behavior
    • 0.003 banker_cridex
    • 0.003 packer_armadillo_regkey
    • 0.003 obliquerat_files
    • 0.003 remcos_regkeys
    • 0.002 antiav_bullgaurd_libs
    • 0.002 antiav_qurb_libs
    • 0.002 antivm_generic_cpu
    • 0.002 antivm_vpc_files
    • 0.002 medusalocker_regkeys
    • 0.002 dcrat_files
    • 0.002 warzonerat_files
    • 0.002 warzonerat_regkeys
    • 0.002 remcos_files
    • 0.002 targeted_flame
    • 0.001 antivm_vmware_libs
    • 0.001 cerber_behavior
    • 0.001 dyre_behavior
    • 0.001 Raccoon Behavior
    • 0.001 persistence_autorun_tasks
    • 0.001 rat_nanocore
    • 0.001 banker_zeus_mutex
    • 0.001 bitcoin_opencl
    • 0.001 browser_security
    • 0.001 disables_browser_warn
    • 0.001 arkei_files
    • 0.001 revil_mutexes
    • 0.001 spreading_autoruninf

    Reporting ( 23.499 seconds )

    • 23.407 BinGraph
    • 0.084 MITRE_TTPS
    • 0.008 PCAP2CERT