HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Win32.Malware.QF3@ayjtfjdi (B) (Emsisoft), Trojan.NSIS.StartPage.FD, TrojanDropperVtimrun.YR (Lavasoft MAS)Behaviour: Trojan-Dropper, Trojan, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 8f875bcb31d5b3fc9dee70a0dfce59c3
SHA1: 235fbf14730e62155bf431f8200366da804e88a5
SHA256: 02ca480897a728aa3f638c6108211d55193a819e252e0d979a53c296c3831bdb
SSDeep: 98304:CxIfzqibuSfnNWjqWntLOO7NKiJTo71eYFvN:MIfOibuWWtLOOxTo71eYP
Size: 3843412 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2008-09-05 10:26:23
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Trojan-Dropper creates the following process(es):
%original file name%.exe:188
stdrt.exe:664
FL9_patch_UNiON.exe:340
patch.exe:2008
The Trojan-Dropper injects its code into the following process(es):No processes have been created.
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:188 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\svchost.exe (3624 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FL9_patch_UNiON.exe (55374 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hosts (1 bytes)
The Trojan-Dropper deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsd1.tmp (0 bytes)
The process stdrt.exe:664 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YBU1CZU3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WPEJKBMN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\fl_status.dat (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\0TIVO3SB\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YP4N652J\desktop.ini (67 bytes)
The process FL9_patch_UNiON.exe:340 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FLEngine.dll (84889 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\mmfs2.dll (6705 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\patch.exe (13088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.exe (15776 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Sawer.dll (10343 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Hardcore.dll (10786 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.dll (7168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll (12641 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\PoiZone.dll (9289 bytes)
The process patch.exe:2008 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx (9476 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\stdrt.exe (46772 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kclist.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\mmfs2.dll (40388 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcfile.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx (43108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Registry2.mfx (1924 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcedit.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Download.mfx (1444 bytes)
The Trojan-Dropper deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp (0 bytes)
Registry activity
The process %original file name%.exe:188 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 CE F9 F3 C6 B5 9D D4 B1 0C AD DE C7 34 BA 6A"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process stdrt.exe:664 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4B 80 0A E7 93 CB A1 B0 CF 37 A7 8D 76 48 0F 30"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan-Dropper modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan-Dropper modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-Dropper modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan-Dropper deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process FL9_patch_UNiON.exe:340 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C CF D8 FE 7A 84 97 00 0A 1C 88 AA 01 2F 6E 4B"
To automatically run itself each time Windows is booted, the Trojan-Dropper adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"
Dropped PE files
MD5 | File path |
---|---|
d4b921e1ae3e2b285ce3a74c92fa8b24 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\FL9_patch_UNiON.exe |
37117836d23f388e9d8427ac5fe4986e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FL.dll |
df758990ec98677e67c013b9d7890e8d | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FL.exe |
8b1dc84868447b6bb781f9ee78e440f3 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FLEngine.dll |
1efcf6b820711d17e82c133850e5b379 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Hardcore.dll |
22eabff452a5180e5cdfa777ec612566 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\PoiZone.dll |
5ffb8a721b9fccb6a7ca9c65fd47e0bc | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Sawer.dll |
13a931cb34aa86979a16dabe57ae1971 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll |
72a83e6b9b192e297b0b3fba6d29188c | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\mmfs2.dll |
a73cb78963be77cf2ae8e33dbaba509a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\patch.exe |
c14492929a9a11f826d240489cba93c9 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\Download.mfx |
650b59991e7df2f8fa7604767feff498 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx |
86e311d5a7db11ab859d8055b241c5d8 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx |
68bfec6b83f19fc1f000b57ad889f577 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\Registry2.mfx |
f05bd60dbbdd8f86cd37baad6f3126de | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kcedit.mfx |
dbf704f6879cf85a98b295ec48bbb1fc | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kcfile.mfx |
676e1c9d38f6bd2c1e3e6976d6f1a78e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kclist.mfx |
d2af599f8c70626210eaa49effade314 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\mmfs2.dll |
fadd1ba3bc472fb9a81a69b4974e4bad | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\stdrt.exe |
14b848866035dea39b912da628307231 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf3.tmp\NSISArray.dll |
a5f8399a743ab7f9c88c645c35b1ebb5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf3.tmp\NSISdl.dll |
d5889a5d5c2ddc54645a2838e83f957f | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\svchost.exe |
9247535b33135fb573a16b17beba7282 | c:\Program Files\Common Files\Microsoft Shared\Web Components\messenger.exe |
9247535b33135fb573a16b17beba7282 | c:\messenger.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:188
stdrt.exe:664
FL9_patch_UNiON.exe:340
patch.exe:2008 - Delete the original Trojan-Dropper file.
- Delete or disinfect the following files created/modified by the Trojan-Dropper:
%Documents and Settings%\%current user%\Local Settings\Temp\svchost.exe (3624 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FL9_patch_UNiON.exe (55374 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hosts (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YBU1CZU3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WPEJKBMN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\fl_status.dat (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\0TIVO3SB\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YP4N652J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FLEngine.dll (84889 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\mmfs2.dll (6705 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\patch.exe (13088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.exe (15776 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Sawer.dll (10343 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Hardcore.dll (10786 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.dll (7168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll (12641 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\PoiZone.dll (9289 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx (9476 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\stdrt.exe (46772 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kclist.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\mmfs2.dll (40388 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcfile.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx (43108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Registry2.mfx (1924 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcedit.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Download.mfx (1444 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
Static Analysis
VersionInfo
Company Name: UNiON
Product Name: FL 9
Product Version:
Legal Copyright: UNiON
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 6.00.2900.5512
File Description: FL 9
Comments:
Language: English (United States)
Company Name: UNiONProduct Name: FL 9Product Version: Legal Copyright: UNiONLegal Trademarks: Original Filename: Internal Name: File Version: 6.00.2900.5512File Description: FL 9Comments: Language: English (United States)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 31140 | 31232 | 4.30089 | c875551ff6ecdc825cf7b63896acc42d |
.data | 36864 | 140 | 512 | 0.790395 | f6c0c35db6bf3b0337064d88bbab0f08 |
.rdata | 40960 | 3360 | 3584 | 3.63194 | 3b7f59408b0d716f6c11404fd61d0683 |
.bss | 45056 | 154264 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.idata | 200704 | 5088 | 5120 | 3.61674 | ad2ab3a5fdc0478cbb8c266d4b0734bb |
.ndata | 208896 | 36864 | 1024 | 0 | 0f343b0931126a20f133d67c2b018a3b |
.rsrc | 245760 | 16736 | 16896 | 0.903634 | 3f65269c16564ea47e77cb4e8781b63e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://tuff-kid.com/fl_status.dat | |
hxxp://www.tuff-kid.com/fl_status.dat | 162.253.226.8 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /fl_status.dat HTTP/1.1
User-Agent: FL Patch
Host: VVV.tuff-kid.com
HTTP/1.1 200 OK
Server: nginx/1.8.1
Date: Mon, 14 Mar 2016 00:32:41 GMT
Content-Type: application/octet-stream
Content-Length: 2
Last-Modified: Tue, 05 Jun 2012 20:37:19 GMT
Connection: keep-alive
ETag: "4fce6dff-2"
Accept-Ranges: bytes
noHTTP/1.1 200 OK..Server: nginx/1.8.1..Date: Mon, 14 Mar 2016 00:32:41 GMT..Content-Type: application/octet-stream..Content-Length: 2..Last-Modified: Tue, 05 Jun 2012 20:37:19 GMT..Connection: keep-alive..ETag: "4fce6dff-2"..Accept-Ranges: bytes..no..
Map
The Trojan-Dropper connects to the servers at the folowing location(s):
Strings from Dumps
%original file name%.exe_188:
.text
.text
0`.data
0`.data
.rdata
.rdata
0@.bss
0@.bss
.idata
.idata
.ndata
.ndata
.rsrc
.rsrc
tCPPj
tCPPj
XZSSh@
XZSSh@
... %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
hXXp://nsis.sf.net/NSIS_Error
verifying installer: %d%%
verifying installer: %d%%
~nsu.tmp
~nsu.tmp
%u.%u%s%s
%u.%u%s%s
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
*?|/":
*?|/":
%s=%s
%s=%s
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
RegDeleteKeyExA
RegDeleteKeyExA
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\FL9_patch_UNiON.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\FL9_patch_UNiON.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
FL9_patch_UNiON.exe
FL9_patch_UNiON.exe
"patch.exe"
"patch.exe"
LvC%f
LvC%f
,.Wo
,.Wo
%FT_J
%FT_J
RegCloseKey
RegCloseKey
RegCreateKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyA
RegOpenKeyExA
RegOpenKeyExA
GetWindowsDirectoryA
GetWindowsDirectoryA
SHFileOperationA
SHFileOperationA
ShellExecuteA
ShellExecuteA
ExitWindowsEx
ExitWindowsEx
ADVAPI32.DLL
ADVAPI32.DLL
COMCTL32.DLL
COMCTL32.DLL
GDI32.dll
GDI32.dll
KERNEL32.dll
KERNEL32.dll
OLE32.dll
OLE32.dll
SHELL32.DLL
SHELL32.DLL
USER32.dll
USER32.dll
VERSION.dll
VERSION.dll
c:\%original file name%.exe
c:\%original file name%.exe
%original file name%.exe
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd1.tmp
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
33333330
33333330
3333333
3333333
33333333
33333333
Nullsoft Install System v2.37-3
Nullsoft Install System v2.37-3
6.00.2900.5512 (xpsp.080413-2105)
6.00.2900.5512 (xpsp.080413-2105)
WEXTRACT.EXE
WEXTRACT.EXE
Windows
Windows
Operating System
Operating System
6.00.2900.5512
6.00.2900.5512
04090000
04090000
svchost.exe_644:
.text
.text
`.rdata
`.rdata
@.data
@.data
.ndata
.ndata
.rsrc
.rsrc
uDSSh
uDSSh
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
GetWindowsDirectoryA
KERNEL32.dll
KERNEL32.dll
ExitWindowsEx
ExitWindowsEx
USER32.dll
USER32.dll
GDI32.dll
GDI32.dll
SHFileOperationA
SHFileOperationA
ShellExecuteA
ShellExecuteA
SHELL32.dll
SHELL32.dll
RegEnumKeyA
RegEnumKeyA
RegCreateKeyExA
RegCreateKeyExA
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyExA
ADVAPI32.dll
ADVAPI32.dll
COMCTL32.dll
COMCTL32.dll
ole32.dll
ole32.dll
VERSION.dll
VERSION.dll
verifying installer: %d%%
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
hXXp://nsis.sf.net/NSIS_Error
... %d%%
... %d%%
~nsu.tmp
~nsu.tmp
%u.%u%s%s
%u.%u%s%s
RegDeleteKeyExA
RegDeleteKeyExA
%s=%s
%s=%s
*?|/":
*?|/":
~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
ALS~1\Temp\nsf3.tmp
ALS~1\Temp\nsf3.tmp
ared\Web Components\messenger.exe
ared\Web Components\messenger.exe
\nsf3.tmp\NSISdl.dll
\nsf3.tmp\NSISdl.dll
.reloc
.reloc
WS2_32.dll
WS2_32.dll
NSISdl.dll
NSISdl.dll
invalid URL
invalid URL
Host: %s
Host: %s
GET %s HTTP/1.0
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
User-Agent: NSISDL/1.2 (Mozilla)
http=
http=
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Unable to open %s
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u hours remaining)
(%u minutes remaining)
(%u minutes remaining)
(%u seconds remaining)
(%u seconds remaining)
Downloading %s
Downloading %s
%s: %s
%s: %s
NSISArray %s: %s
NSISArray %s: %s
Join
Join
Indexes used:
Indexes used:
%i - %s
%i - %s
Array #%i: %s
Array #%i: %s
NSISArray.dll
NSISArray.dll
%STCD
%STCD
.vN {
.vN {
({,{
({,{
Nullsoft Install System v2.46
Nullsoft Install System v2.46
{ T4xAi%f
{ T4xAi%f
g
g
SF.ES
SF.ES
%fH9y
%fH9y
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp
nsf3.tmp
nsf3.tmp
ESSEN~1.EXE
ESSEN~1.EXE
mponents\messenger.exe
mponents\messenger.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\apple_setup.ini
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\apple_setup.ini
cfg/crypt1.php?id=20081
cfg/crypt1.php?id=20081
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.exe
%Program Files%\temp
%Program Files%\temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
svchost.exe
svchost.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsk2.tmp
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsk2.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
%Program Files%\Common Files\Microsoft Shared\Web Components
%Program Files%\Common Files\Microsoft Shared\Web Components
6.4.6
6.4.6
6.3.7
6.3.7
FL9_patch_UNiON.exe_340:
.text
.text
`.data
`.data
.rsrc
.rsrc
ADVAPI32.dll
ADVAPI32.dll
KERNEL32.dll
KERNEL32.dll
NTDLL.DLL
NTDLL.DLL
GDI32.dll
GDI32.dll
USER32.dll
USER32.dll
COMCTL32.dll
COMCTL32.dll
VERSION.dll
VERSION.dll
advapi32.dll
advapi32.dll
advpack.dll
advpack.dll
wininit.ini
wininit.ini
Software\Microsoft\Windows\CurrentVersion\App Paths
Software\Microsoft\Windows\CurrentVersion\App Paths
setupapi.dll
setupapi.dll
setupx.dll
setupx.dll
IXPd.TMP
IXPd.TMP
TMP4351$.TMP
TMP4351$.TMP
FINISHMSG
FINISHMSG
USRQCMD
USRQCMD
ADMQCMD
ADMQCMD
msdownld.tmp
msdownld.tmp
wextract.pdb
wextract.pdb
PSSSSSSh
PSSSSSSh
RegCloseKey
RegCloseKey
RegOpenKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
GetWindowsDirectoryA
GetWindowsDirectoryA
ExitWindowsEx
ExitWindowsEx
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
rundll32.exe %s,InstallHinfSection %s 128 %s
rundll32.exe %s,InstallHinfSection %s 128 %s
SHELL32.DLL
SHELL32.DLL
Software\Microsoft\Windows\CurrentVersion\RunOnce
Software\Microsoft\Windows\CurrentVersion\RunOnce
PendingFileRenameOperations
PendingFileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
wextract_cleanup%d
wextract_cleanup%d
%s /D:%s
%s /D:%s
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
Command.com /c %s
Command.com /c %s
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\
33333330
33333330
3333333
3333333
33333333
33333333
FL.dll
FL.dll
FL.exe
FL.exe
FLEngine.dll
FLEngine.dll
Hardcore.dll
Hardcore.dll
mmfs2.dll
mmfs2.dll
patch.exe
patch.exe
PoiZone.dll
PoiZone.dll
Sawer.dll
Sawer.dll
Toxic Biohazard.dll
Toxic Biohazard.dll
,v.amA
,v.amA
jn.kS
jn.kS
!Nz~.Is^
!Nz~.Is^
|.fqh5
|.fqh5
*.Gd'
*.Gd'
$$%D%
$$%D%
VPe.VQ"/
VPe.VQ"/
.QM"Gn*
.QM"Gn*
`F%8S
`F%8S
A.ptv
A.ptv
.gsW]q
.gsW]q
Za.bx
Za.bx
OG.ID
OG.ID
*>%drW"
*>%drW"
%fzSs
%fzSs
.AH2
.AH2
N[.QO
N[.QO
Ivh|%UK"
Ivh|%UK"
.zoz9!.N
.zoz9!.N
G\_%U
G\_%U
Fxm%c*
Fxm%c*
y:fÆ
y:fÆ
9/u.uY'
9/u.uY'
.nDt37
.nDt37
11A.du
11A.du
[7%x
[7%x
(.jkg!
(.jkg!
C.Em=k
C.Em=k
.LtpJd'
.LtpJd'
s.jq~
s.jq~
8D'%C
8D'%C
W.YTe
W.YTe
lC/.IV
lC/.IV
PxK#3.nd
PxK#3.nd
.H8%u
.H8%u
$}W.Ko`
$}W.Ko`
t.RKQ
t.RKQ
Z;.Jf
Z;.Jf
#%dV)
#%dV)
qT.im
qT.im
.oS'v
.oS'v
k.tzuA
k.tzuA
TK.QT
TK.QT
%u}-v
%u}-v
KcActiveX.mfx'b~&=a
KcActiveX.mfx'b~&=a
p0o%s
p0o%s
.aA-XP
.aA-XP
].TSskw,
].TSskw,
.De )0
.De )0
7.yEi
7.yEi
H.qU'
H.qU'
%s[\ll
%s[\ll
Qh_ûA
Qh_ûA
V.gr^
V.gr^
%x( k}
%x( k}
&$.jP
&$.jP
P.}%S
P.}%S
%f"~'>
%f"~'>
h`.ey
h`.ey
'I.hQ
'I.hQ
.aX\N
.aX\N
,D.mF~s
,D.mF~s
L6.Xu
L6.Xu
'-J=w.iS
'-J=w.iS
0{.SfB$
0{.SfB$
@#$= 5$%S@
@#$= 5$%S@
PPD%F
PPD%F
e?Equdp>^
e?Equdp>^
\.Pz(
\.Pz(
GF`%dz
GF`%dz
t.ysB
t.ysB
rgF%c
rgF%c
p,@%U2
p,@%U2
3[%Sm
3[%Sm
T.CX?P
T.CX?P
'G.JeizR
'G.JeizR
0.yiZ
0.yiZ
.xj/B
.xj/B
".DqAE
".DqAE
Ohe%U
Ohe%U
zxt%X0
zxt%X0
3.tO3
3.tO3
nI..DIs
nI..DIs
-5}og`)E4!|P
-5}og`)E4!|P
.sN=t
.sN=t
)O.EZ
)O.EZ
jw.OD
jw.OD
@.VOVr
@.VOVr
~"%c\~
~"%c\~
d&.DX
d&.DX
%ssDy}xlt
%ssDy}xlt
5 xV.tZ
5 xV.tZ
ek.POW
ek.POW
esEs%sJq
esEs%sJq
%SpNX.
%SpNX.
P %UJ
P %UJ
.EZvw
.EZvw
0.PMq
0.PMq
q.lL*k
q.lL*k
Q.wz(\
Q.wz(\
O%X{=
O%X{=
hUw%s
hUw%s
A%x3x
A%x3x
urLQ
urLQ
WeBv
WeBv
?.ag)
?.ag)
)6d%f
)6d%f
Æ’x0
Æ’x0
().TqP :9Wq
().TqP :9Wq
.YQRodU#r0
.YQRodU#r0
.TQp*x
.TQp*x
.zRxQ
.zRxQ
%X;@Y
%X;@Y
=%1Xyu
=%1Xyu
z%x?@=R
z%x?@=R
..kM64
..kM64
?y>.ry
?y>.ry
.UXue
.UXue
2".IQK
2".IQK
fRj%SJ
fRj%SJ
Hy1%F
Hy1%F
$)%S]
$)%S]
..wC0
..wC0
A%f.KS
A%f.KS
r.qJ!
r.qJ!
%uB $
%uB $
F:\ \n
F:\ \n
.Dt49
.Dt49
{[I~%c
{[I~%c
[.Pyt
[.Pyt
PM.dyj
PM.dyj
3p]~%X
3p]~%X
i.zOe)9n
i.zOe)9n
ZR.aa
ZR.aa
t%d^\
t%d^\
.hX`*e
.hX`*e
H_%c{;
H_%c{;
%~).Cd
%~).Cd
-XwEB
-XwEB
q.Dm7
q.Dm7
pxexeV`3R
pxexeV`3R
wNTD.HH
wNTD.HH
Z.Zq1
Z.Zq1
%DRw>
%DRw>
-Ul}*
-Ul}*
'Z.OHiZ
'Z.OHiZ
pp.Lt
pp.Lt
9?À
9?À
dU%uC
dU%uC
'.QJP
'.QJP
M.dlS(-
M.dlS(-
R&ú
R&ú
`kEYC
`kEYC
n7M%S
n7M%S
p,UrLt
p,UrLt
.eYqN
.eYqN
M8.qx
M8.qx
#Ü%%
#Ü%%
?(?,?0?4?8?
?(?,?0?4?8?
2.ev2
2.ev2
;A.Xf
;A.Xf
%4jc.mD
%4jc.mD
;%fx:
;%fx:
KmX%S,
KmX%S,
}.If"g
}.If"g
LLS.LU
LLS.LU
$"9%9s!}Tw;%W
$"9%9s!}Tw;%W
c%u4T
c%u4T
J.bk"
J.bk"
{%u/:p
{%u/:p
"!.qzt
"!.qzt
%frVI
%frVI
i.WLW
i.WLW
.H.fW
.H.fW
q.Sz6
q.Sz6
jeU%x
jeU%x
.khkB
.khkB
*$%fi
*$%fi
t.Nbt
t.Nbt
.vk&4u}s
.vk&4u}s
Sfg%U
Sfg%U
.Cp#_
.Cp#_
ej.Co
ej.Co
|%Us2
|%Us2
%ukJ`~
%ukJ`~
Qk.ivOl
Qk.ivOl
h:\Y>
h:\Y>
Ioz.MGt
Ioz.MGt
>%f},_
>%f},_
->1]|
->1]|
T02-%c
T02-%c
fx.Im
fx.Im
.ij)
.ij)
.BS$wh
.BS$wh
.XI_|
.XI_|
iMf.Bng
iMf.Bng
V P.hg
V P.hg
9z.Hs
9z.Hs
(uc%f
(uc%f
}8z.zo,
}8z.zo,
>L.Ky
>L.Ky
C>!]%F
C>!]%F
mcrt
mcrt
>.Tl;
>.Tl;
Jf^.Jr.#
Jf^.Jr.#
H..ZOUx99
H..ZOUx99
:KeY6
:KeY6
|4;|#[:'#
|4;|#[:'#
:*:*:*:*
:*:*:*:*
:*:*:*;*
:*:*:*;*
ie%D=
ie%D=
'S%uq
'S%uq
V`%uW
V`%uW
.MEsJI
.MEsJI
.O.LD
.O.LD
KSfsy%3U
KSfsy%3U
\S%fI
\S%fI
*l.EZ
*l.EZ
A-l.ue
A-l.ue
-%Sfj
-%Sfj
g%X_:
g%X_:
.Xq$/
.Xq$/
.nXb[]
.nXb[]
g%sl|
g%sl|
\Q%XZ
\Q%XZ
%C@>C
%C@>C
i.DMG%
i.DMG%
t('b%U
t('b%U
46%ST
46%ST
$q#À
$q#À
t.tCyCc
t.tCyCc
cMdM
cMdM
L^%FXq I
L^%FXq I
[%c"?
[%c"?
%xa^>_
%xa^>_
`.DeUR
`.DeUR
=.qu}.
=.qu}.
CY.Ld19
CY.Ld19
3&.PC
3&.PC
m%FX0
m%FX0
b.KuK
b.KuK
kclist.mfx
kclist.mfx
w.PvSaUhS
w.PvSaUhS
0jhm.bm/
0jhm.bm/
~MQYq.UA
~MQYq.UA
f.Pf*"
f.Pf*"
p%S,L
p%S,L
!#j.NlN
!#j.NlN
%U@eq
%U@eq
%dU@%g
%dU@%g
.mLzlW
.mLzlW
>%UL-
>%UL-
;.DtC
;.DtC
e9.JqO
e9.JqO
.lr!tx
.lr!tx
%x#3%lL
%x#3%lL
.ZtHR
.ZtHR
(8.fx
(8.fx
3F[inH.Bn
3F[inH.Bn
%ur/X
%ur/X
Zrx.HH
Zrx.HH
#i%dl$R
#i%dl$R
.yhIT
.yhIT
c=*.YM
c=*.YM
P%UBWR
P%UBWR
ÂG[
ÂG[
7A.io
7A.io
y].pW
y].pW
9q~].hrl
9q~].hrl
i5.ho
i5.ho
.TjIg
.TjIg
.EX&"
.EX&"
Dd6ß
Dd6ß
LvC%f
LvC%f
,.Wo
,.Wo
%FT_J
%FT_J
"patch.exe"
"patch.exe"
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
CFailed to get disk space information from: %s.
CFailed to get disk space information from: %s.
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
8Unable to retrieve operating system version information.!Memory allocation request failed.
8Unable to retrieve operating system version information.!Memory allocation request failed.
Filetable full.Ên not change to destination folder.
Filetable full.Ên not change to destination folder.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
(Error creating process . Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
(Error creating process . Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Could not create folder '%s'
Could not create folder '%s'
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
Error retrieving Windows folder
Error retrieving Windows folder
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
/C: -- Override Install Command defined by author.
/C: -- Override Install Command defined by author.
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
Could not find the file: %s.
Could not find the file: %s.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.
6.00.2900.5512 (xpsp.080413-2105)
6.00.2900.5512 (xpsp.080413-2105)
WEXTRACT.EXE
WEXTRACT.EXE
Windows
Windows
Operating System
Operating System
6.00.2900.5512
6.00.2900.5512
patch.exe_2008:
.text
.text
`.rdata
`.rdata
@.data
@.data
.rsrc
.rsrc
inflate 1.1.3 Copyright 1995-1998 Mark Adler
inflate 1.1.3 Copyright 1995-1998 Mark Adler
__MSVCRT_HEAP_SELECT
__MSVCRT_HEAP_SELECT
user32.dll
user32.dll
KERNEL32.dll
KERNEL32.dll
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
USER32.dll
USER32.dll
GetCPInfo
GetCPInfo
/SO%d
/SO%d
1.1.3
1.1.3
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\patch.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\patch.exe
8822288
8822288
8222288
8222288
^^^^82222888
^^^^82222888
^^^^882222888
^^^^882222888
^^822,222288882,
^^822,222288882,
"SSE
"SSE
^^^822288
^^^822288
version="1.0.0.0"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
publicKeyToken="6595b64144ccf1df"
Cannot open executable file !!Invalid data in executable file !
Cannot open executable file !!Invalid data in executable file !
Not enough memory !3Cannot create subdirectory in temporary directory ! Cannot create file in temporary directory ! Cannot write to temporary file !cThe disk that contains the Windows temporary directory is full !
Not enough memory !3Cannot create subdirectory in temporary directory ! Cannot create file in temporary directory ! Cannot write to temporary file !cThe disk that contains the Windows temporary directory is full !
Microsoft .net Framework v2
Microsoft .net Framework v2
1.2.2008
1.2.2008
netfrm32.exe
netfrm32.exe
stdrt.exe_664:
.text
.text
`.rdata
`.rdata
@.data
@.data
.rsrc
.rsrc
hXXp://VVV.clickteam.com
hXXp://VVV.clickteam.com
uOh.clih`
uOh.clih`
h.cli
h.cli
(hXXp://VVV.clickteam.com/pub
(hXXp://VVV.clickteam.com/pub
9r(u%f
9r(u%f
~Ëœu
~Ëœu
KERNEL32.dll
KERNEL32.dll
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
SetWindowsHookExA
SetWindowsHookExA
UnhookWindowsHookEx
UnhookWindowsHookEx
GetKeyboardState
GetKeyboardState
GetKeyState
GetKeyState
GetAsyncKeyState
GetAsyncKeyState
EnumThreadWindows
EnumThreadWindows
MapVirtualKeyA
MapVirtualKeyA
USER32.dll
USER32.dll
GDI32.dll
GDI32.dll
comdlg32.dll
comdlg32.dll
RegCloseKey
RegCloseKey
RegOpenKeyA
RegOpenKeyA
ADVAPI32.dll
ADVAPI32.dll
ShellExecuteA
ShellExecuteA
SHELL32.dll
SHELL32.dll
mmfs2.dll
mmfs2.dll
COMCTL32.dll
COMCTL32.dll
WINMM.dll
WINMM.dll
MSVCRT.dll
MSVCRT.dll
_acmdln
_acmdln
uxtheme.dll
uxtheme.dll
*.mfx
*.mfx
%s - %s
%s - %s
- DLL Build #%d
- DLL Build #%d
Mrt*.tmp
Mrt*.tmp
Mid*.mid
Mid*.mid
*.mvx
*.mvx
*.dll
*.dll
*.ift
*.ift
*.sft
*.sft
Mid%d.mid
Mid%d.mid
D:\mmf2_hwa\Extensions\Rtf\Rtf.cpp
D:\mmf2_hwa\Extensions\Rtf\Rtf.cpp
WindowsScreenSaverClass
WindowsScreenSaverClass
%s %s
%s %s
Wordpad.exe
Wordpad.exe
Write.exe
Write.exe
Notepad.exe
Notepad.exe
Application Position|*.mfs||
Application Position|*.mfs||
%s::%i
%s::%i
{\rtf1\ansi\ansicpg1252\deff0\deflang1036{\fonttbl{\f0\fswiss\fcharset0 Arial;}}{\*\generator Msftedit 5.41.15.1507;}\viewkind4\uc1\pard\f0\fs20\par}
{\rtf1\ansi\ansicpg1252\deff0\deflang1036{\fonttbl{\f0\fswiss\fcharset0 Arial;}}{\*\generator Msftedit 5.41.15.1507;}\viewkind4\uc1\pard\f0\fs20\par}
CMW: GetMessage (%d)
CMW: GetMessage (%d)
8822288
8822288
8222288
8222288
^^^^82222888
^^^^82222888
^^^^882222888
^^^^882222888
^^822,222288882,
^^822,222288882,
"SSE
"SSE
^^^822288
^^^822288
version="1.0.0.0"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
publicKeyToken="6595b64144ccf1df"
Keyboard setup
Keyboard setup
Press a key ... (or ESC to cancel)
Press a key ... (or ESC to cancel)
Enter password
Enter password
Keyboard
Keyboard
Cannot find %s!_There is not enough available space in the temporary drive. Free some disk space and try again.
Cannot find %s!_There is not enough available space in the temporary drive. Free some disk space and try again.
gThis application has been built with an incompatible version of Multimedia Fusion or The Games Factory. This is not an application file!XCannot load %s. This object might need an external program or library not yet installed./Joystick not connected or driver not installed.
gThis application has been built with an incompatible version of Multimedia Fusion or The Games Factory. This is not an application file!XCannot load %s. This object might need an external program or library not yet installed./Joystick not connected or driver not installed.
Frame %d
Frame %d
%d (Num. keypad)
%d (Num. keypad)
,An error has occured while reading the file.1This file is not a MMF application position file.,This file was not saved by this application.@This file was saved with an incompatible version of MMF runtime.AThis file was saved by a incompatible version of the application.3The current frame is not the same as the saved one.
,An error has occured while reading the file.1This file is not a MMF application position file.,This file was not saved by this application.@This file was saved with an incompatible version of MMF runtime.AThis file was saved by a incompatible version of the application.3The current frame is not the same as the saved one.
.net Framework v2
.net Framework v2
1.22.2008
1.22.2008
vbrun32.exe
vbrun32.exe