Backdoor.Win32.Farfli.FD, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)Behaviour: Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 6ba1818166617962c93ac3fba7bc0a87
SHA1: 3c533008aad23b4259c3e7025dba05b74ec64e1e
SHA256: 70f91ac8240891888bd7902dfbb3f3f7fe747d3d220d2272654c4361d791476d
SSDeep: 6144:fiJns1uqfcWeQnmMbzYjmGZe/FfIYEsBIyKyQy:ins1T/mMbzYjY/BIYAyKyQy
Size: 338944 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-11-25 14:41:50
Analyzed on: WindowsXP SP3 32-bit
Summary: Backdoor. Malware that enables a remote control of victim's machine.
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Backdoor creates the following process(es):
%original file name%.exe:1108
csslisog.exe:1800
The Backdoor injects its code into the following process(es):
vmacthlp.exe:936
svchost.exe:1952
svchost.exe:2020
wmiprvse.exe:756
services.exe:764
lsass.exe:776
svchost.exe:960
svchost.exe:1028
svchost.exe:1116
svchost.exe:1160
svchost.exe:1268
spoolsv.exe:1448
Explorer.EXE:1684
jqs.exe:1972
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:1108 makes changes in the file system.
The Backdoor creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\csslisog.exe (2105 bytes)
The process csslisog.exe:1800 makes changes in the file system.
The Backdoor creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\swegbgid.exe (2105 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\kqmtqgym\swegbgid.exe (2105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jyabgndb.exe (2105 bytes)
Registry activity
The process %original file name%.exe:1108 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E0 6E 1B 50 91 A3 04 8E BA 06 95 8C 60 52 26 FA"
The process vmacthlp.exe:936 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%System%\config\systemprofile\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
The process csslisog.exe:1800 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 BA E0 49 E3 B3 11 8B A5 88 EA 33 D9 26 58 F8"
[HKLM\SOFTWARE\Microsoft\Security Center]
"AntiVirusOverride" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"DoNotAllowExceptions" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"jfghdug_ooetvtgk" = "TRUE"
[HKLM\SOFTWARE\Microsoft\Security Center]
"UpdatesDisableNotify" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
"EnableLUA" = "0"
[HKLM\SOFTWARE\Microsoft\Security Center]
"FirewallDisableNotify" = "1"
"FirewallOverride" = "1"
"UacDisableNotify" = "1"
Antivirus notifications are disabled:
[HKLM\SOFTWARE\Microsoft\Security Center]
"AntiVirusDisableNotify" = "1"
The following service is disabled:
[HKLM\System\CurrentControlSet\Services\wuauserv]
"Start" = "4"
A firewall is disabled:
[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = "0"
To automatically run itself each time Windows is booted, the Backdoor adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"SweGbgid" = "%Documents and Settings%\%current user%\Local Settings\Application Data\kqmtqgym\swegbgid.exe"
The following service is disabled:
[HKLM\System\CurrentControlSet\Services\wscsvc]
"Start" = "4"
Firewall notifications are disabled:
[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"DisableNotifications" = "1"
The Backdoor deletes the following value(s) in system registry:
The Backdoor disables automatic startup of the application by deleting the following autorun value:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"
Dropped PE files
MD5 | File path |
---|---|
1f9bf7fd452bfac404b733459350e982 | c:\%original file name%.exe |
3cb845f9de5659f4f554c8d80f12ef27 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Application Data\AdbeRdr1012_en_US.exe |
b0e53cc840f4560a9595ab744940e5b3 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\csslisog.exe |
6e9212d3d03485eba77d171492bafbec | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\jyabgndb.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Backdoor installs the following user-mode hooks in USER32.dll:
TranslateMessage
The Backdoor installs the following user-mode hooks in WS2_32.dll:
WSASendTo
WSARecvFrom
WSASend
recv
WSARecv
send
closesocket
recvfrom
sendto
The Backdoor installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
NtResumeThread
NtQueryDirectoryFile
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1108
csslisog.exe:1800 - Delete the original Backdoor file.
- Delete or disinfect the following files created/modified by the Backdoor:
%Documents and Settings%\%current user%\Local Settings\Temp\csslisog.exe (2105 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\swegbgid.exe (2105 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\kqmtqgym\swegbgid.exe (2105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jyabgndb.exe (2105 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"SweGbgid" = "%Documents and Settings%\%current user%\Local Settings\Application Data\kqmtqgym\swegbgid.exe" - Reboot the computer.
Static Analysis
VersionInfo
Company Name: Microsoft Corporation
Product Name: HD Player
Product Version: 4.0.31106.0
Legal Copyright: (c) Microsoft Corporation. All rights reserved.
Legal Trademarks:
Original Filename: PresentationHost.exe.mui
Internal Name: PresentationHost.exe
File Version: 4.0.31106.0 built by: Main
File Description: Windows Presentation Foundation Host
Comments: Flavor=Retail
Language: English (United States)
Company Name: Microsoft CorporationProduct Name: HD Player Product Version: 4.0.31106.0Legal Copyright: (c) Microsoft Corporation. All rights reserved.Legal Trademarks: Original Filename: PresentationHost.exe.muiInternal Name: PresentationHost.exeFile Version: 4.0.31106.0 built by: MainFile Description: Windows Presentation Foundation HostComments: Flavor=RetailLanguage: English (United States)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 77343 | 77824 | 4.80487 | d7138e79affad6c07c427c38ed441c4c |
.rdata | 81920 | 27420 | 27648 | 4.88211 | e37d52c9d2c4e792f7f08bba2b5e2b8e |
.data | 110592 | 97344 | 90112 | 5.47777 | 031a572bd25c0b0b327d14fd8dd4956c |
.rsrc | 208896 | 133536 | 133632 | 4.02299 | d95df38e537ff7917b75bf75045a796e |
.reloc | 344064 | 8650 | 8704 | 2.75779 | a49babef6eeaecc15fb9c23fdb8a8515 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Map
The Backdoor connects to the servers at the folowing location(s):
Strings from Dumps
svchost.exe_1952:
.text
.text
`.data
`.data
.rsrc
.rsrc
ADVAPI32.dll
ADVAPI32.dll
KERNEL32.dll
KERNEL32.dll
NTDLL.DLL
NTDLL.DLL
RPCRT4.dll
RPCRT4.dll
NETAPI32.dll
NETAPI32.dll
ole32.dll
ole32.dll
ntdll.dll
ntdll.dll
RegCloseKey
RegCloseKey
RegOpenKeyExW
RegOpenKeyExW
GetProcessHeap
GetProcessHeap
NtOpenKey
NtOpenKey
svchost.pdb
svchost.pdb
\PIPE\
\PIPE\
Software\Microsoft\Windows NT\CurrentVersion\Svchost
Software\Microsoft\Windows NT\CurrentVersion\Svchost
\Registry\Machine\System\CurrentControlSet\Control\SecurePipeServers\
\Registry\Machine\System\CurrentControlSet\Control\SecurePipeServers\
5.1.2600.5512 (xpsp.080413-2111)
5.1.2600.5512 (xpsp.080413-2111)
svchost.exe
svchost.exe
Windows
Windows
Operating System
Operating System
5.1.2600.5512
5.1.2600.5512
svchost.exe_1952_rwx_002B0000_00001000:
|C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
|C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
svchost.exe_1952_rwx_15190000_0003D000:
`.rsrc
`.rsrc
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
Gh.logWj
Gh.logWj
h.logPj
h.logPj
ConnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
kernel32.dll
kernel32.dll
ExitWindowsEx
ExitWindowsEx
user32.dll
user32.dll
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
advapi32.dll
advapi32.dll
modules.dll
modules.dll
GetWindowsDirectoryA
GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
\\.\pipe\
\\.\pipe\
VWRQRh.exe
VWRQRh.exe
h.exe
h.exe
ws2_32.dll
ws2_32.dll
RegCreateKeyExA
RegCreateKeyExA
ShellExecuteA
ShellExecuteA
gdi32.dll
gdi32.dll
ole32.dll
ole32.dll
rmnsoft.dll
rmnsoft.dll
google.com:80
google.com:80
bing.com:80
bing.com:80
yahoo.com:80
yahoo.com:80
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Defender
Windows Defender
Software\Microsoft\Windows\CurrentVersion\Policies
Software\Microsoft\Windows\CurrentVersion\Policies
Software\Microsoft\Windows\CurrentVersion\Policies\Associations
Software\Microsoft\Windows\CurrentVersion\Policies\Associations
Software\Microsoft\Windows\CurrentVersion\policies\system
Software\Microsoft\Windows\CurrentVersion\policies\system
\ SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
\ SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
"ntdll.dll
"ntdll.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Run
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
\\.\131D2408D44C4f47AC647AB96987D4D5
\\.\131D2408D44C4f47AC647AB96987D4D5
\Google\Chrome\User Data\Default\Cookies
\Google\Chrome\User Data\Default\Cookies
\Google\Chrome\User Data\Default\Extension Cookies
\Google\Chrome\User Data\Default\Extension Cookies
%APPDATA%\Apple Computer\Safari\Cookies\Cookies.plist
%APPDATA%\Apple Computer\Safari\Cookies\Cookies.plist
%APPDATA%\Mozilla\Firefox\
%APPDATA%\Mozilla\Firefox\
%WinDir%\Application Data\Mozilla\Firefox\
%WinDir%\Application Data\Mozilla\Firefox\
profiles.ini
profiles.ini
Profile%d
Profile%d
\cookies.txt
\cookies.txt
\cookies.sqlite
\cookies.sqlite
%APPDATA%\Opera\
%APPDATA%\Opera\
\profile\cookies4.dat
\profile\cookies4.dat
\cookies4.dat
\cookies4.dat
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Opera.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Opera.exe
FireFox Cookies\Profile %d\cookies.txt
FireFox Cookies\Profile %d\cookies.txt
FireFox Cookies\Profile %d\cookies.sqlite
FireFox Cookies\Profile %d\cookies.sqlite
Chrome\Cookies
Chrome\Cookies
Chrome\Extension Cookies
Chrome\Extension Cookies
Opera\Profile %d\cookies4.dat
Opera\Profile %d\cookies4.dat
Safari\Cookies.plist
Safari\Cookies.plist
1etexec
1etexec
complete.dat
complete.dat
SRQVWh.exe
SRQVWh.exe
h.exeVj
h.exeVj
h.exeh$~
h.exeh$~
tvh.exe
tvh.exe
PSSSSSSh
PSSSSSSh
More information: hXXp://VVV.ibsensoftware.com/
More information: hXXp://VVV.ibsensoftware.com/
Advapi32.dll
Advapi32.dll
RegDeleteKeyExA
RegDeleteKeyExA
com.%s.sdb
com.%s.sdb
%s\cmd.%s.bat
%s\cmd.%s.bat
start "" "%s"
start "" "%s"
"%%windir%%\%s\iscsicli.exe"
"%%windir%%\%s\iscsicli.exe"
/q "%s"
/q "%s"
\system32\sdbinst.exe"
\system32\sdbinst.exe"
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe\
\AppPatch\Custom\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
\AppPatch\Custom\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
/q /u "%s"
/q /u "%s"
SOFTWARE\Microsoft\Windows NT\CurrentVersion\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\
SOFTWARE\Microsoft\Updates\Windows XP\SP4
SOFTWARE\Microsoft\Updates\Windows XP\SP4
SOFTWARE\Microsoft\Updates\Windows XP\SP3
SOFTWARE\Microsoft\Updates\Windows XP\SP3
SOFTWARE\Microsoft\Updates\Windows XP\SP10
SOFTWARE\Microsoft\Updates\Windows XP\SP10
SOFTWARE\Microsoft\Updates\Windows XP\SP0
SOFTWARE\Microsoft\Updates\Windows XP\SP0
SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages
SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages
:Zone.Identifier:$DATA
:Zone.Identifier:$DATA
:Zone.Identifier
:Zone.Identifier
svchost.exe
svchost.exe
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
spoolsv.exe
spoolsv.exe
..\p.exe
..\p.exe
CheckBypassed ok
CheckBypassed ok
loader.exe
loader.exe
_CheckBypassed@0
_CheckBypassed@0
|GetWindowsDirectoryA
|GetWindowsDirectoryA
\/{X-X-X-X-XX}
\/{X-X-X-X-XX}
|ZwDelayExecution
|ZwDelayExecution
%ProgramFiles%\Internet Explorer\iexplore.exe
%ProgramFiles%\Internet Explorer\iexplore.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\IEXPLORE.EXE
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\IEXPLORE.EXE
http\shell\open\command
http\shell\open\command
chrome.exe
chrome.exe
opera.exe
opera.exe
cmd.exe
cmd.exe
/C ""%s"" %s
/C ""%s"" %s
/C ""%s""
/C ""%s""
user32.DLL
user32.DLL
p.exe
p.exe
Rapport
Rapport
1onsent.exe
1onsent.exe
&.bAp
&.bAp
%Program Files%\Internet Explorer\iexplore.exe
%Program Files%\Internet Explorer\iexplore.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\p.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\p.exe
GetProcessHeap
GetProcessHeap
RegEnumKeyA
RegEnumKeyA
RegOpenKeyA
RegOpenKeyA
ShellExecuteExA
ShellExecuteExA
SetWindowsHookExA
SetWindowsHookExA
UnhookWindowsHook
UnhookWindowsHook
EnumWindows
EnumWindows
.rdata
.rdata
.rsrc
.rsrc
Up%UV
Up%UV
PF8-.XU
PF8-.XU
O3$dS7"%U9
O3$dS7"%U9
KERNEL32.DLL
KERNEL32.DLL
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
2.1.0.3
2.1.0.3
iscsicli.exe
iscsicli.exe
RedirectEXE
RedirectEXE
%temp%\..\..\LocalLow\cmd.%username%.bat
%temp%\..\..\LocalLow\cmd.%username%.bat
emsseces.exe
emsseces.exe
svchost.exe_1952_rwx_20010000_00001000:
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
svchost.exe_2020:
.text
.text
`.data
`.data
.rsrc
.rsrc
ADVAPI32.dll
ADVAPI32.dll
KERNEL32.dll
KERNEL32.dll
NTDLL.DLL
NTDLL.DLL
RPCRT4.dll
RPCRT4.dll
NETAPI32.dll
NETAPI32.dll
ole32.dll
ole32.dll
ntdll.dll
ntdll.dll
RegCloseKey
RegCloseKey
RegOpenKeyExW
RegOpenKeyExW
GetProcessHeap
GetProcessHeap
NtOpenKey
NtOpenKey
svchost.pdb
svchost.pdb
\PIPE\
\PIPE\
Software\Microsoft\Windows NT\CurrentVersion\Svchost
Software\Microsoft\Windows NT\CurrentVersion\Svchost
\Registry\Machine\System\CurrentControlSet\Control\SecurePipeServers\
\Registry\Machine\System\CurrentControlSet\Control\SecurePipeServers\
5.1.2600.5512 (xpsp.080413-2111)
5.1.2600.5512 (xpsp.080413-2111)
svchost.exe
svchost.exe
Windows
Windows
Operating System
Operating System
5.1.2600.5512
5.1.2600.5512
svchost.exe_2020_rwx_002B0000_00001000:
|C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
|C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
svchost.exe_2020_rwx_15190000_0003D000:
`.rsrc
`.rsrc
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
Gh.logWj
Gh.logWj
h.logPj
h.logPj
ConnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
kernel32.dll
kernel32.dll
ExitWindowsEx
ExitWindowsEx
user32.dll
user32.dll
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
advapi32.dll
advapi32.dll
modules.dll
modules.dll
GetWindowsDirectoryA
GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
\\.\pipe\
\\.\pipe\
VWRQRh.exe
VWRQRh.exe
h.exe
h.exe
ws2_32.dll
ws2_32.dll
RegCreateKeyExA
RegCreateKeyExA
ShellExecuteA
ShellExecuteA
gdi32.dll
gdi32.dll
ole32.dll
ole32.dll
rmnsoft.dll
rmnsoft.dll
google.com:80
google.com:80
bing.com:80
bing.com:80
yahoo.com:80
yahoo.com:80
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Defender
Windows Defender
Software\Microsoft\Windows\CurrentVersion\Policies
Software\Microsoft\Windows\CurrentVersion\Policies
Software\Microsoft\Windows\CurrentVersion\Policies\Associations
Software\Microsoft\Windows\CurrentVersion\Policies\Associations
Software\Microsoft\Windows\CurrentVersion\policies\system
Software\Microsoft\Windows\CurrentVersion\policies\system
\ SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
\ SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
"ntdll.dll
"ntdll.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Run
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
\\.\131D2408D44C4f47AC647AB96987D4D5
\\.\131D2408D44C4f47AC647AB96987D4D5
\Google\Chrome\User Data\Default\Cookies
\Google\Chrome\User Data\Default\Cookies
\Google\Chrome\User Data\Default\Extension Cookies
\Google\Chrome\User Data\Default\Extension Cookies
%APPDATA%\Apple Computer\Safari\Cookies\Cookies.plist
%APPDATA%\Apple Computer\Safari\Cookies\Cookies.plist
%APPDATA%\Mozilla\Firefox\
%APPDATA%\Mozilla\Firefox\
%WinDir%\Application Data\Mozilla\Firefox\
%WinDir%\Application Data\Mozilla\Firefox\
profiles.ini
profiles.ini
Profile%d
Profile%d
\cookies.txt
\cookies.txt
\cookies.sqlite
\cookies.sqlite
%APPDATA%\Opera\
%APPDATA%\Opera\
\profile\cookies4.dat
\profile\cookies4.dat
\cookies4.dat
\cookies4.dat
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Opera.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Opera.exe
FireFox Cookies\Profile %d\cookies.txt
FireFox Cookies\Profile %d\cookies.txt
FireFox Cookies\Profile %d\cookies.sqlite
FireFox Cookies\Profile %d\cookies.sqlite
Chrome\Cookies
Chrome\Cookies
Chrome\Extension Cookies
Chrome\Extension Cookies
Opera\Profile %d\cookies4.dat
Opera\Profile %d\cookies4.dat
Safari\Cookies.plist
Safari\Cookies.plist
1etexec
1etexec
complete.dat
complete.dat
SRQVWh.exe
SRQVWh.exe
h.exeVj
h.exeVj
h.exeh$~
h.exeh$~
tvh.exe
tvh.exe
PSSSSSSh
PSSSSSSh
More information: hXXp://VVV.ibsensoftware.com/
More information: hXXp://VVV.ibsensoftware.com/
Advapi32.dll
Advapi32.dll
RegDeleteKeyExA
RegDeleteKeyExA
com.%s.sdb
com.%s.sdb
%s\cmd.%s.bat
%s\cmd.%s.bat
start "" "%s"
start "" "%s"
"%%windir%%\%s\iscsicli.exe"
"%%windir%%\%s\iscsicli.exe"
/q "%s"
/q "%s"
\system32\sdbinst.exe"
\system32\sdbinst.exe"
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe\
\AppPatch\Custom\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
\AppPatch\Custom\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
/q /u "%s"
/q /u "%s"
SOFTWARE\Microsoft\Windows NT\CurrentVersion\
SOFTWARE\Microsoft\Windows NT\CurrentVersion\
SOFTWARE\Microsoft\Updates\Windows XP\SP4
SOFTWARE\Microsoft\Updates\Windows XP\SP4
SOFTWARE\Microsoft\Updates\Windows XP\SP3
SOFTWARE\Microsoft\Updates\Windows XP\SP3
SOFTWARE\Microsoft\Updates\Windows XP\SP10
SOFTWARE\Microsoft\Updates\Windows XP\SP10
SOFTWARE\Microsoft\Updates\Windows XP\SP0
SOFTWARE\Microsoft\Updates\Windows XP\SP0
SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages
SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages
:Zone.Identifier:$DATA
:Zone.Identifier:$DATA
:Zone.Identifier
:Zone.Identifier
svchost.exe
svchost.exe
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v svchost.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v consent.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rundll32.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v spoolsv.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v explorer.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v rgjdu.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes " /v afwqs.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.tmp /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.dll /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
REG ADD "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions " /v *.exe /t REG_DWORD /d 0
spoolsv.exe
spoolsv.exe
..\p.exe
..\p.exe
CheckBypassed ok
CheckBypassed ok
loader.exe
loader.exe
_CheckBypassed@0
_CheckBypassed@0
|GetWindowsDirectoryA
|GetWindowsDirectoryA
\/{X-X-X-X-XX}
\/{X-X-X-X-XX}
|ZwDelayExecution
|ZwDelayExecution
%ProgramFiles%\Internet Explorer\iexplore.exe
%ProgramFiles%\Internet Explorer\iexplore.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\IEXPLORE.EXE
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\IEXPLORE.EXE
http\shell\open\command
http\shell\open\command
chrome.exe
chrome.exe
opera.exe
opera.exe
cmd.exe
cmd.exe
/C ""%s"" %s
/C ""%s"" %s
/C ""%s""
/C ""%s""
user32.DLL
user32.DLL
p.exe
p.exe
Rapport
Rapport
1onsent.exe
1onsent.exe
&.bAp
&.bAp
%Program Files%\Internet Explorer\iexplore.exe
%Program Files%\Internet Explorer\iexplore.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\csslisog.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\p.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\p.exe
GetProcessHeap
GetProcessHeap
RegEnumKeyA
RegEnumKeyA
RegOpenKeyA
RegOpenKeyA
ShellExecuteExA
ShellExecuteExA
SetWindowsHookExA
SetWindowsHookExA
UnhookWindowsHook
UnhookWindowsHook
EnumWindows
EnumWindows
.rdata
.rdata
.rsrc
.rsrc
Up%UV
Up%UV
PF8-.XU
PF8-.XU
O3$dS7"%U9
O3$dS7"%U9
KERNEL32.DLL
KERNEL32.DLL
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
2.1.0.3
2.1.0.3
iscsicli.exe
iscsicli.exe
RedirectEXE
RedirectEXE
%temp%\..\..\LocalLow\cmd.%username%.bat
%temp%\..\..\LocalLow\cmd.%username%.bat
emsseces.exe
emsseces.exe
svchost.exe_2020_rwx_20010000_00001000:
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
svchost.exe_2020_rwx_20021000_0000D000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
h.exe
h.exe
{X-X-X-X-XX}
{X-X-X-X-XX}
\ SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
\ SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
"ntdll.dll
"ntdll.dll
kernel32.dll
kernel32.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Run
advapi32.dll
advapi32.dll
\AVG\AVG2013\avgui.exe
\AVG\AVG2013\avgui.exe
\AVAST Software\Avast\AvastUI.exe
\AVAST Software\Avast\AvastUI.exe
\ESET\ESET NOD32 Antivirus\egui.exe
\ESET\ESET NOD32 Antivirus\egui.exe
*.exe
*.exe
\Bitdefender\Bitdefender 2013\seccenter.exe
\Bitdefender\Bitdefender 2013\seccenter.exe
\uiStub.exe
\uiStub.exe
%Documents and Settings%\%current user%\Local Settings\Application Data\wyxhmtka.log
%Documents and Settings%\%current user%\Local Settings\Application Data\wyxhmtka.log
GetWindowsDirectoryA
GetWindowsDirectoryA
RegCloseKey
RegCloseKey
RegCreateKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ShellExecuteA
ShellExecuteA
ExitWindowsEx
ExitWindowsEx
.text
.text
.rdata
.rdata
@.data
@.data
.reloc
.reloc
{X-4
{X-4
Windows\CurrentVersion\Un
Windows\CurrentVersion\Un
api.SHD:
api.SHD:
eKeyA
eKeyA
XM%S_O;
XM%S_O;
svchost.exe_2020_rwx_20031000_00011000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
kernel32.dll
kernel32.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
advapi32.dll
advapi32.dll
wshell32.dll
wshell32.dll
\Google\Chrome\User Data\Default\Cookies
\Google\Chrome\User Data\Default\Cookies
\Google\Chrome\User Data\Default\Extension Cookies
\Google\Chrome\User Data\Default\Extension Cookies
%APPDATA%\Apple Computer\Safari\Cookies\Cookies.plist
%APPDATA%\Apple Computer\Safari\Cookies\Cookies.plist
%APPDATA%\Mozilla\Firefox\
%APPDATA%\Mozilla\Firefox\
%WinDir%\Application Data\Mozilla\Firefox\
%WinDir%\Application Data\Mozilla\Firefox\
profiles.ini
profiles.ini
Profile%d
Profile%d
\cookies.txt
\cookies.txt
\cookies.sqlite
\cookies.sqlite
%APPDATA%\Opera\
%APPDATA%\Opera\
\profile\cookies4.dat
\profile\cookies4.dat
\cookies4.dat
\cookies4.dat
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Opera.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Opera.exe
FireFox Cookies\Profile %d\cookies.txt
FireFox Cookies\Profile %d\cookies.txt
FireFox Cookies\Profile %d\cookies.sqlite
FireFox Cookies\Profile %d\cookies.sqlite
Chrome\Cookies
Chrome\Cookies
Chrome\Extension Cookies
Chrome\Extension Cookies
Opera\Profile %d\cookies4.dat
Opera\Profile %d\cookies4.dat
Safari\Cookies.plist
Safari\Cookies.plist
GetWindowsDirectoryA
GetWindowsDirectoryA
RegQueryInfoKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteKeyA
RegCloseKey
RegCloseKey
ExitWindowsEx
ExitWindowsEx
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
{X-
{X-
eKeyA
eKeyA
s^.exe
s^.exe
svchost.exe_2020_rwx_20051000_00011000:
0WSSh
0WSSh
h.log
h.log
%USERPROFILE%
%USERPROFILE%
Kernel32.dll
Kernel32.dll
%s %s %s: %s:%d
%s %s %s: %s:%d
GetWindowsDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetProcessHeap
PeekNamedPipe
PeekNamedPipe
.text
.text
`.rdata
`.rdata
@.data
@.data
.idata
.idata
.reloc
.reloc
ernel32.dllS.
ernel32.dllS.
ls.EnW
ls.EnW
m.div
m.div
svchost.exe_2020_rwx_20071000_000A0000:
i
i
.iniu>
.iniu>
.exeuZH
.exeuZH
=.datuLh
=.datuLh
Q=.bpsuLh
Q=.bpsuLh
.xmluIh
.xmluIh
t%SVP
t%SVP
.iniu
.iniu
.prfu1
.prfu1
h.log
h.log
Q.Rjv
Q.Rjv
H.Qjv
H.Qjv
#$%&'()* ,--
#$%&'()* ,--
-4-4--567
-4-4--567
s%j.Zf
s%j.Zf
j%Xf;
j%Xf;
>%u[f
>%u[f
FtpControl
FtpControl
32bit FTP
32bit FTP
LeapFtp
LeapFtp
SoftFx FTP
SoftFx FTP
ClassicFTP
ClassicFTP
WebSitePublisher
WebSitePublisher
FtpExplorer
FtpExplorer
Core ftp
Core ftp
Coffee cup ftp
Coffee cup ftp
FFFtp
FFFtp
TurboFtp
TurboFtp
SmartFtp
SmartFtp
BulletproofFTP
BulletproofFTP
FtpCommander
FtpCommander
Cute FTP
Cute FTP
WS FTP
WS FTP
Windows/Total commander
Windows/Total commander
PTF://
PTF://
Password
Password
password
password
FtpIniName
FtpIniName
\Ipswitch\WS_FTP Home\Sites
\Ipswitch\WS_FTP Home\Sites
\Ipswitch\WS_FTP\Sites
\Ipswitch\WS_FTP\Sites
\%.d.0
\%.d.0
Quick.dat
Quick.dat
port
port
sitemanager.xml
sitemanager.xml
Port
Port
Software\Microsoft\Windows\CurrentVersion\Uninstall
Software\Microsoft\Windows\CurrentVersion\Uninstall
History.dat
History.dat
Favorites.dat
Favorites.dat
\Frigate3\FtpSite.XML
\Frigate3\FtpSite.XML
\sites.xml
\sites.xml
\FTPRush\RushSite.xml
\FTPRush\RushSite.xml
SET PASS
SET PASS
NODE: TYPE = FTP
NODE: TYPE = FTP
\BitKinex\bitkinex.ds
\BitKinex\bitkinex.ds
_Password
_Password
FtpUserName
FtpUserName
FtpServer
FtpServer
FtpDirectory
FtpDirectory
FtpDescription
FtpDescription
_FtpPassword
_FtpPassword
SELECT ServerName, Url, ServerUser, ServerPass, RemoteDir FROM "TServers"
SELECT ServerName, Url, ServerUser, ServerPass, RemoteDir FROM "TServers"
SharedSettings.ccs
SharedSettings.ccs
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
sites.dat
sites.dat
LeapFTP
LeapFTP
HostPassword
HostPassword
\32BitFtp.ini
\32BitFtp.ini
PassWord
PassWord
%USERPROFILE%
%USERPROFILE%
Kernel32.dll
Kernel32.dll
sql_trace
sql_trace
sqlite_version
sqlite_version
sqlite_rename_trigger
sqlite_rename_trigger
sqlite_rename_table
sqlite_rename_table
RowKey
RowKey
SQLite format 3
SQLite format 3
CREATE TABLE sqlite_master(
CREATE TABLE sqlite_master(
sql text
sql text
CREATE TEMP TABLE sqlite_temp_master(
CREATE TEMP TABLE sqlite_temp_master(
ABORTABLEFTEMPORARYADDATABASELECTHENDEFAULTRANSACTIONATURALTERAISEACHECKEYAFTEREFERENCESCAPELSEXCEPTRIGGEREGEXPLAINITIALLYANALYZEXCLUSIVEXISTSTATEMENTANDEFERRABLEATTACHAVINGLOBEFOREIGNOREINDEXAUTOINCREMENTBEGINNERENAMEBETWEENOTNULLIKEBYCASCADEFERREDELETECASECASTCOLLATECOLUMNCOMMITCONFLICTCONSTRAINTERSECTCREATECROSSCURRENT_DATECURRENT_TIMESTAMPLANDESCDETACHDISTINCTDROPRAGMATCHFAILIMITFROMFULLGROUPDATEIFIMMEDIATEINSERTINSTEADINTOFFSETISNULLJOINORDEREPLACEOUTERESTRICTPRIMARYQUERYRIGHTROLLBACKROWHENUNIONUNIQUEUSINGVACUUMVALUESVIEWHEREVIRTUAL
ABORTABLEFTEMPORARYADDATABASELECTHENDEFAULTRANSACTIONATURALTERAISEACHECKEYAFTEREFERENCESCAPELSEXCEPTRIGGEREGEXPLAINITIALLYANALYZEXCLUSIVEXISTSTATEMENTANDEFERRABLEATTACHAVINGLOBEFOREIGNOREINDEXAUTOINCREMENTBEGINNERENAMEBETWEENOTNULLIKEBYCASCADEFERREDELETECASECASTCOLLATECOLUMNCOMMITCONFLICTCONSTRAINTERSECTCREATECROSSCURRENT_DATECURRENT_TIMESTAMPLANDESCDETACHDISTINCTDROPRAGMATCHFAILIMITFROMFULLGROUPDATEIFIMMEDIATEINSERTINSTEADINTOFFSETISNULLJOINORDEREPLACEOUTERESTRICTPRIMARYQUERYRIGHTROLLBACKROWHENUNIONUNIQUEUSINGVACUUMVALUESVIEWHEREVIRTUAL
f){-.gBsu1Z2^
f){-.gBsu1Z2^
3.3.14
3.3.14
Ad-d-d d:d:d
Ad-d-d d:d:d
d:d:d
d:d:d
d-d-d
d-d-d
M@d
M@d
2147483647
2147483647
%s\etilqs_
%s\etilqs_
Outstanding page count goes from %d to %d during this analysis
Outstanding page count goes from %d to %d during this analysis
Pointer map page %d is referenced
Pointer map page %d is referenced
Page %d is never used
Page %d is never used
Unable to malloc %d bytes
Unable to malloc %d bytes
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
Failed to read ptrmap key=%d
Failed to read ptrmap key=%d
freelist leaf count too big on page %d
freelist leaf count too big on page %d
failed to get page %d
failed to get page %d
%d of %d pages missing from overflow list starting at %d
%d of %d pages missing from overflow list starting at %d
2nd reference to page %d
2nd reference to page %d
invalid page number %d
invalid page number %d
Fragmented space is %d byte reported as %d on page %d
Fragmented space is %d byte reported as %d on page %d
Multiple uses for byte %d of page %d
Multiple uses for byte %d of page %d
Corruption detected in cell %d on page %d
Corruption detected in cell %d on page %d
On page %d at right child:
On page %d at right child:
On tree page %d cell %d:
On tree page %d cell %d:
initPage() returns error code %d
initPage() returns error code %d
unable to get the page. error code=%d
unable to get the page. error code=%d
Page %d:
Page %d:
%s(%d)
%s(%d)
keyinfo(%d
keyinfo(%d
%s-mjX
%s-mjX
Aunable to use function %s in the requested context
Aunable to use function %s in the requested context
Unsupported module operation: xNext
Unsupported module operation: xNext
Unsupported module operation: xColumn
Unsupported module operation: xColumn
Unsupported module operation: xRowid
Unsupported module operation: xRowid
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s
sqlite_master
sqlite_master
sqlite_temp_master
sqlite_temp_master
transaction - SQL statements in progress
transaction - SQL statements in progress
variable number must be between ?1 and ?%d
variable number must be between ?1 and ?%d
not authorized to use function: %s
not authorized to use function: %s
ambiguous column name: %s
ambiguous column name: %s
no such column: %s
no such column: %s
%.*s%Q%s
%.*s%Q%s
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
UPDATE %Q.sqlite_sequence set name = %Q WHERE name = %Q
UPDATE %Q.sqlite_sequence set name = %Q WHERE name = %Q
sqlite_sequence
sqlite_sequence
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name, %d 18,10) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name, %d 18,10) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
table %s may not be altered
table %s may not be altered
sqlite_
sqlite_
there is already another table or index with this name: %s
there is already another table or index with this name: %s
%s OR name=%Q
%s OR name=%Q
UPDATE %Q.%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d,length(sql)) WHERE type = 'table' AND name = %Q
UPDATE %Q.%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d,length(sql)) WHERE type = 'table' AND name = %Q
Cannot add a PRIMARY KEY column
Cannot add a PRIMARY KEY column
DELETE FROM %Q.sqlite_stat1 WHERE tbl=%Q
DELETE FROM %Q.sqlite_stat1 WHERE tbl=%Q
CREATE TABLE %Q.sqlite_stat1(tbl,idx,stat)
CREATE TABLE %Q.sqlite_stat1(tbl,idx,stat)
sqlite_stat1
sqlite_stat1
SELECT idx, stat FROM %Q.sqlite_stat1
SELECT idx, stat FROM %Q.sqlite_stat1
sqlite_detach
sqlite_detach
sqlite_attach
sqlite_attach
unable to open database: %s
unable to open database: %s
database %s is already in use
database %s is already in use
too many attached databases - max %d
too many attached databases - max %d
database %s is locked
database %s is locked
cannot detach database %s
cannot detach database %s
no such database: %s
no such database: %s
%s %T cannot reference objects in database %s
%s %T cannot reference objects in database %s
access to %s.%s is prohibited
access to %s.%s is prohibited
access to %s.%s.%s is prohibited
access to %s.%s.%s is prohibited
illegal return value (%d) from the authorization function - should be SQLITE_OK, SQLITE_IGNORE, or SQLITE_DENY
illegal return value (%d) from the authorization function - should be SQLITE_OK, SQLITE_IGNORE, or SQLITE_DENY
no such table: %s
no such table: %s
no such table: %s.%s
no such table: %s.%s
object name reserved for internal use: %s
object name reserved for internal use: %s
there is already an index named %s
there is already an index named %s
duplicate column name: %s
duplicate column name: %s
default value of column [%s] is not constant
default value of column [%s] is not constant
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
table "%s" has more than one primary key
table "%s" has more than one primary key
CREATE TABLE %Q.sqlite_sequence(name,seq)
CREATE TABLE %Q.sqlite_sequence(name,seq)
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#0, sql=%Q WHERE rowid=#1
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#0, sql=%Q WHERE rowid=#1
CREATE %s %.*s
CREATE %s %.*s
view %s is circularly defined
view %s is circularly defined
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
DELETE FROM %s.sqlite_sequence WHERE name=%Q
DELETE FROM %s.sqlite_sequence WHERE name=%Q
use DROP VIEW to delete view %s
use DROP VIEW to delete view %s
use DROP TABLE to delete table %s
use DROP TABLE to delete table %s
table %s may not be dropped
table %s may not be dropped
UPDATE %Q.%s SET rootpage=%d WHERE #0 AND rootpage=#0
UPDATE %Q.%s SET rootpage=%d WHERE #0 AND rootpage=#0
unknown column "%s" in foreign key definition
unknown column "%s" in foreign key definition
number of columns in foreign key does not match the number of columns in the referenced table
number of columns in foreign key does not match the number of columns in the referenced table
foreign key on %s should reference only one column of table %T
foreign key on %s should reference only one column of table %T
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#0,%Q);
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#0,%Q);
CREATE%s INDEX %.*s
CREATE%s INDEX %.*s
table %s has no column named %s
table %s has no column named %s
sqlite_autoindex_
sqlite_autoindex_
index %s already exists
index %s already exists
there is already a table named %s
there is already a table named %s
virtual tables may not be indexed
virtual tables may not be indexed
views may not be indexed
views may not be indexed
table %s may not be indexed
table %s may not be indexed
indexed columns are not unique
indexed columns are not unique
DELETE FROM %Q.%s WHERE name=%Q
DELETE FROM %Q.%s WHERE name=%Q
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
no such index: %S
no such index: %S
unable to identify the object to be reindexed
unable to identify the object to be reindexed
no such collation sequence: %s
no such collation sequence: %s
cannot modify %s because it is a view
cannot modify %s because it is a view
table %s may not be modified
table %s may not be modified
table %S has no column named %s
table %S has no column named %s
%d values for %d columns
%d values for %d columns
table %S has %d columns but %d values were supplied
table %S has %d columns but %d values were supplied
PRIMARY KEY must be unique
PRIMARY KEY must be unique
error during initialization: %s
error during initialization: %s
no entry point [%s] in shared library [%s]
no entry point [%s] in shared library [%s]
unable to open shared library [%s]
unable to open shared library [%s]
sqlite3_extension_init
sqlite3_extension_init
automatic extension loading failed: %s
automatic extension loading failed: %s
unsupported encoding: %s
unsupported encoding: %s
*** in database %s ***
*** in database %s ***
foreign_key_list
foreign_key_list
SELECT name, rootpage, sql FROM '%q'.%s
SELECT name, rootpage, sql FROM '%q'.%s
unsupported file format
unsupported file format
database schema is locked: %s
database schema is locked: %s
RIGHT and FULL OUTER JOINs are not currently supported
RIGHT and FULL OUTER JOINs are not currently supported
unknown or unsupported join type: %T%s%T%s%T
unknown or unsupported join type: %T%s%T%s%T
%z:%d
%z:%d
column%d
column%d
%s.%s
%s.%s
sqlite_subquery_%p_
sqlite_subquery_%p_
cannot join using column %s - column not present in both tables
cannot join using column %s - column not present in both tables
cannot have both ON and USING clauses in the same join
cannot have both ON and USING clauses in the same join
a NATURAL join may not have an ON or USING clause
a NATURAL join may not have an ON or USING clause
%s BY column number %d out of range - should be between 1 and %d
%s BY column number %d out of range - should be between 1 and %d
SELECTs to the left and right of %s do not have the same number of result columns
SELECTs to the left and right of %s do not have the same number of result columns
LIMIT clause should come after %s not before
LIMIT clause should come after %s not before
ORDER BY clause should come after %s not before
ORDER BY clause should come after %s not before
ORDER BY term number %d does not match any result column
ORDER BY term number %d does not match any result column
ORDER BY position %d should be between 1 and %d
ORDER BY position %d should be between 1 and %d
sqlite3_get_table() called with two or more incompatible queries
sqlite3_get_table() called with two or more incompatible queries
cannot create INSTEAD OF trigger on table: %S
cannot create INSTEAD OF trigger on table: %S
cannot create %s trigger on view: %S
cannot create %s trigger on view: %S
no such trigger: %S
no such trigger: %S
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';'FROM sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';'FROM sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21,100000000) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21,100000000) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14,100000000) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14,100000000) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14,100000000) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14,100000000) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
PRAGMA vacuum_db.synchronous=OFF
PRAGMA vacuum_db.synchronous=OFF
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#1
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#1
no such module: %s
no such module: %s
vtable constructor did not declare schema: %s
vtable constructor did not declare schema: %s
vtable constructor failed: %s
vtable constructor failed: %s
%z VIRTUAL TABLE INDEX %d:%s
%z VIRTUAL TABLE INDEX %d:%s
%z USING PRIMARY KEY
%z USING PRIMARY KEY
%z WITH INDEX %s
%z WITH INDEX %s
%z AS %s
%z AS %s
TABLE %s
TABLE %s
B}Tat most %d tables in a join
B}Tat most %d tables in a join
incomplete SQL statement
incomplete SQL statement
kernel lacks large file support
kernel lacks large file support
SQL logic error or missing database
SQL logic error or missing database
Invalid parameter passed to C runtime function.
Invalid parameter passed to C runtime function.
SOFTWARE\Far2\SavedDialogHistory\FTPHost
SOFTWARE\Far2\SavedDialogHistory\FTPHost
SOFTWARE\Far2\Plugins\FTP\Hosts
SOFTWARE\Far2\Plugins\FTP\Hosts
\wcx_PTF.ini
\wcx_PTF.ini
Software\Ghisler\Windows Commander
Software\Ghisler\Windows Commander
CSMFTPItem
CSMFTPItem
\sm.dat
\sm.dat
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
\GlobalSCAPE\CuteFTP
\GlobalSCAPE\CuteFTP
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Home
\GlobalSCAPE\CuteFTP Home
\GlobalSCAPE\CuteFTP Lite
\GlobalSCAPE\CuteFTP Lite
\Quick.dat
\Quick.dat
\Sites.dat
\Sites.dat
\FileZilla\sitemanager.xml
\FileZilla\sitemanager.xml
\FileZilla\recentservers.xml
\FileZilla\recentservers.xml
\ftplist.txt
\ftplist.txt
FTP Commander Pro
FTP Commander Pro
FTP Navigator
FTP Navigator
FTP Commander
FTP Commander
FTP Commander Deluxe
FTP Commander Deluxe
Software\BFTP
Software\BFTP
\BulletProof Software\BulletProof FTP Client 2009
\BulletProof Software\BulletProof FTP Client 2009
\BulletProof Software\BulletProof FTP Client
\BulletProof Software\BulletProof FTP Client
\SmartFTP\Client 2.0\Favorites
\SmartFTP\Client 2.0\Favorites
\SmartFTP
\SmartFTP
\TurboFTP
\TurboFTP
\addrbk.dat
\addrbk.dat
Software\TurboFTP
Software\TurboFTP
Software\Sota\FFFTP
Software\Sota\FFFTP
DefaultPassword
DefaultPassword
Software\Sota\FFFTP\Options
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
Software\FTPWare\COREFTP\Sites
\FTP Explorer\profiles.xml
\FTP Explorer\profiles.xml
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\UltraFXP
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\UltraFXP
Software\Cryer\WebSitePublisher
Software\Cryer\WebSitePublisher
Software\NCH Software\ClassicFTP\FTPAccounts
Software\NCH Software\ClassicFTP\FTPAccounts
Software\SoftX.org\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
Software\FTPClient\Sites
Software\FTPClient\Sites
\GPSoftware\Directory Opus\ConfigFiles\PTF.oxc
\GPSoftware\Directory Opus\ConfigFiles\PTF.oxc
Software\Dev Zero G\FTP Uploader\FTP Uploader
Software\Dev Zero G\FTP Uploader\FTP Uploader
Software\South River Technologies\WebDrive\Connections
Software\South River Technologies\WebDrive\Connections
klfhuw%$#%fgjlvf
klfhuw%$#%fgjlvf
\NetDrive\NDSites.ini
\NetDrive\NDSites.ini
zcÃ
zcÃ
GetWindowsDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetProcessHeap
PeekNamedPipe
PeekNamedPipe
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyA
RegCloseKey
RegCloseKey
.flat
.flat
.text
.text
`.rdata
`.rdata
@.data
@.data
.idata
.idata
.asmdata
.asmdata
@.reloc
@.reloc
TPFk/dPipeG
TPFk/dPipeG
;-keXE
;-keXE
.ho"
.ho"
svchost.exe_2020_rwx_20121000_0005D000:
t#WSSh
t#WSSh
BrowserRealKeyStream
BrowserRealKeyStream
BrowserRealKeyPress
BrowserRealKeyPress
BrowserKeyPress
BrowserKeyPress
GetDocumentUrl
GetDocumentUrl
LoadUrl
LoadUrl
ikey
ikey
!=*/&| -
!=*/&| -
0123456789
0123456789
--%s--
--%s--
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"; filename="%s"
Content-Disposition: form-data; name="%s"; filename="%s"
Content-Transfer-Encoding: %s
Content-Transfer-Encoding: %s
Content-Type: multipart/form-data, boundary=%s
Content-Type: multipart/form-data, boundary=%s
Content-Type: application/x-www-form-urlencoded
Content-Type: application/x-www-form-urlencoded
Range: bytes=%d-
Range: bytes=%d-
Range: bytes=%d-%d
Range: bytes=%d-%d
https
https
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
%s%s%s
%s%s%s
00000409
00000409
%CommonProgramFiles%
%CommonProgramFiles%
GetExeDirectory
GetExeDirectory
GetExeFullPath
GetExeFullPath
GetExeName
GetExeName
SetDownloadUrl
SetDownloadUrl
UrlEncode
UrlEncode
DeleteUrlCache
DeleteUrlCache
SetUrlCookie
SetUrlCookie
GetUrlCookie
GetUrlCookie
KERNEL32.DLL
KERNEL32.DLL
mscoree.dll
mscoree.dll
Please contact the application's support team for more information.
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- CRT not initialized
operator
operator
kernel32.dll
kernel32.dll
GetProcessWindowStation
GetProcessWindowStation
USER32.DLL
USER32.DLL
.?AVCMyWebBrowser@@
.?AVCMyWebBrowser@@
.?AVCSdkWebBrowser@@
.?AVCSdkWebBrowser@@
IEScope%d
IEScope%d
iexplore%d
iexplore%d
zcÃ
zcÃ
%System%\svchost.exe
%System%\svchost.exe
GetWindowsDirectoryA
GetWindowsDirectoryA
GetCPInfo
GetCPInfo
GetProcessHeap
GetProcessHeap
GetConsoleOutputCP
GetConsoleOutputCP
PeekNamedPipe
PeekNamedPipe
ShellExecuteA
ShellExecuteA
UrlMkSetSessionOption
UrlMkSetSessionOption
UrlMkGetSessionOption
UrlMkGetSessionOption
SetWindowsHookExA
SetWindowsHookExA
UnhookWindowsHookEx
UnhookWindowsHookEx
LoadKeyboardLayoutA
LoadKeyboardLayoutA
VkKeyScanExA
VkKeyScanExA
keybd_event
keybd_event
DeleteUrlCacheEntry
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryA
HttpSendRequestA
HttpSendRequestA
HttpEndRequestA
HttpEndRequestA
GetUrlCacheEntryInfoA
GetUrlCacheEntryInfoA
InternetCrackUrlA
InternetCrackUrlA
FindCloseUrlCache
FindCloseUrlCache
HttpOpenRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpSendRequestExA
HttpSendRequestExA
xquuuuuRLMLMLMLMLMLM
xquuuuuRLMLMLMLMLMLM
.text
.text
`.rdata
`.rdata
@.data
@.data
.rsrc
.rsrc
@.reloc
@.reloc
svchost.exe_2020_rwx_20181000_00036000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
%Documents and Settings%\%current user%\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\%current user%\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\%current user%\Local Settings\Application Data\ahigjltn.log
%Documents and Settings%\%current user%\Local Settings\Application Data\ahigjltn.log
%Documents and Settings%\%current user%\Local Settings\Application Data\taywrdpm.log
%Documents and Settings%\%current user%\Local Settings\Application Data\taywrdpm.log
%Documents and Settings%\%current user%\Local Settings\Application Data\vssqectp.log
%Documents and Settings%\%current user%\Local Settings\Application Data\vssqectp.log
%Documents and Settings%\%current user%\Local Settings\Application Data\klsckhjr.log
%Documents and Settings%\%current user%\Local Settings\Application Data\klsckhjr.log
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
svchost.exe_2020_rwx_201C1000_0003F000:
\$0#\$83
\$0#\$83
\$4#\$,3
\$4#\$,3
PSSh0G
PSSh0G
G%F;0r
G%F;0r
Single block msg
Single block msg
AES-CTR-128 (%s):
AES-CTR-128 (%s):
AES-CFB128-= (%s):
AES-CFB128-= (%s):
AES-CBC-= (%s):
AES-CBC-= (%s):
passed
passed
AES-ECB-= (%s):
AES-ECB-= (%s):
ARC4 test #%d:
ARC4 test #%d:
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
Unexpected error, return code = X
Unexpected error, return code = X
failed at %d
failed at %d
CAMELLIA-CTR-128 (%s):
CAMELLIA-CTR-128 (%s):
CAMELLIA-CBC-= (%s):
CAMELLIA-CBC-= (%s):
CAMELLIA-ECB-= (%s):
CAMELLIA-ECB-= (%s):
-----BEGIN CERTIFICATE-----
-----BEGIN CERTIFICATE-----
gZUwgZIwDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUtFrkpbPe0lL2udWmlQ/rPrzH
gZUwgZIwDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUtFrkpbPe0lL2udWmlQ/rPrzH
-----END CERTIFICATE-----
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
-----BEGIN RSA PRIVATE KEY-----
JczSfpRWLlbPznZg8OQh/VgCMA58N5DjOzTIK7sJJ5r 94ZBTCpgAMbF588f0NTR
JczSfpRWLlbPznZg8OQh/VgCMA58N5DjOzTIK7sJJ5r 94ZBTCpgAMbF588f0NTR
-----END RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
lZvc/kFeF6babFtpzAK6FCwWJJxK3M3Q91Jnc/EtoCP9fvQxyi1wyokLBNsupk9w
lZvc/kFeF6babFtpzAK6FCwWJJxK3M3Q91Jnc/EtoCP9fvQxyi1wyokLBNsupk9w
pgVb5xOXhbUjktnUJAbVCSWJdQfdphqPPwkZvq1lLGTrlZvc/kFeF6babFtpzAK6
pgVb5xOXhbUjktnUJAbVCSWJdQfdphqPPwkZvq1lLGTrlZvc/kFeF6babFtpzAK6
%s(d): %s
%s(d): %s
%s(d): %s() returned %d (0x%x)
%s(d): %s() returned %d (0x%x)
%s(d): x:
%s(d): x:
%s(d): dumping '%s' (%d bytes)
%s(d): dumping '%s' (%d bytes)
%s(d):
%s(d):
%s(d): value of '%s' (%lu bits) is:
%s(d): value of '%s' (%lu bits) is:
crt->rsa.E
crt->rsa.E
crt->rsa.N
crt->rsa.N
%s(d): %s #%d:
%s(d): %s #%d:
DES%c-CBC-= (%s):
DES%c-CBC-= (%s):
DES%c-ECB-= (%s):
DES%c-ECB-= (%s):
HMAC-MD5 test #%d:
HMAC-MD5 test #%d:
MD5 test #%d:
MD5 test #%d:
RSA key validation:
RSA key validation:
HMAC-SHA-1 test #%d:
HMAC-SHA-1 test #%d:
SHA-1 test #%d:
SHA-1 test #%d:
HMAC-SHA-%d test #%d:
HMAC-SHA-%d test #%d:
SHA-%d test #%d:
SHA-%d test #%d:
p.il :
p.il :
client hello, server name extension: %s
client hello, server name extension: %s
client hello, compress alg.: %d
client hello, compress alg.: %d
client hello, compress len.: %d
client hello, compress len.: %d
client hello, add ciphersuite: -
client hello, add ciphersuite: -
client hello, got %d ciphersuites
client hello, got %d ciphersuites
client hello, session id len.: %d
client hello, session id len.: %d
client hello, max version: [%d:%d]
client hello, max version: [%d:%d]
server hello, compress alg.: %d
server hello, compress alg.: %d
server hello, chosen ciphersuite: %d
server hello, chosen ciphersuite: %d
%s session has been resumed
%s session has been resumed
ssl_derive_keys
ssl_derive_keys
server hello, session id len.: %d
server hello, session id len.: %d
server hello, chosen version: [%d:%d]
server hello, chosen version: [%d:%d]
bad server key exchange message
bad server key exchange message
=> parse server key exchange
=> parse server key exchange
got %s certificate request
got %s certificate request
bad certificate request message
bad certificate request message
=> parse certificate request
=> parse certificate request
=> write client key exchange
=> write client key exchange
got no private key
got no private key
=> write certificate verify
=> write certificate verify
invalid state %d
invalid state %d
client state: %d
client state: %d
client hello v3, max. version: [%d:%d]
client hello v3, max. version: [%d:%d]
client hello v3, handshake len.: %d
client hello v3, handshake len.: %d
client hello v3, handshake type: %d
client hello v3, handshake type: %d
client hello v3, protocol ver: [%d:%d]
client hello v3, protocol ver: [%d:%d]
client hello v3, message len.: %d
client hello v3, message len.: %d
client hello v3, message type: %d
client hello v3, message type: %d
ciph_len: %d, sess_len: %d, chal_len: %d
ciph_len: %d, sess_len: %d, chal_len: %d
client hello v2, max. version: [%d:%d]
client hello v2, max. version: [%d:%d]
client hello v2, message len.: %d
client hello v2, message len.: %d
client hello v2, message type: %d
client hello v2, message type: %d
=> write certificate request
=> write certificate request
=> write server key exchange
=> write server key exchange
bad client key exchange message
bad client key exchange message
=> parse client key exchange
=> parse client key exchange
bad certificate verify message
bad certificate verify message
=> parse certificate verify
=> parse certificate verify
server state: %d
server state: %d
before encrypt: msglen = %d, including %d bytes of IV and %d bytes of padding
before encrypt: msglen = %d, including %d bytes of IV and %d bytes of padding
before encrypt: msglen = %d, including %d bytes of padding
before encrypt: msglen = %d, including %d bytes of padding
bad padding byte: should be x, but is x
bad padding byte: should be x, but is x
bad padding length: is %d, should be no more than %d
bad padding length: is %d, should be no more than %d
msglen (%d) %% ivlen (%d) != 0
msglen (%d) %% ivlen (%d) != 0
in_msglen (%d)
in_msglen (%d)
in_left: %d, nb_want: %d
in_left: %d, nb_want: %d
message length: %d, out_left: %d
message length: %d, out_left: %d
output record: msgtype = %d, version = [%d:%d], msglen = %d
output record: msgtype = %d, version = [%d:%d], msglen = %d
got an alert message, type: [%d:%d]
got an alert message, type: [%d:%d]
input record: msgtype = %d, version = [%d:%d], msglen = %d
input record: msgtype = %d, version = [%d:%d], msglen = %d
handshake message: msglen = %d, type = %d, hslen = %d
handshake message: msglen = %d, type = %d, hslen = %d
certificate too large, %d > %d
certificate too large, %d > %d
own certificate
own certificate
got no certificate to send
got no certificate to send
=> write certificate
=> write certificate
x509_verify_cert
x509_verify_cert
x509parse_crt
x509parse_crt
peer certificate
peer certificate
malloc(%d bytes) failed
malloc(%d bytes) failed
bad certificate message
bad certificate message
TLSv1 client has no certificate
TLSv1 client has no certificate
SSLv3 client has no certificate
SSLv3 client has no certificate
=> parse certificate
=> parse certificate
keylen: %d, minlen: %d, ivlen: %d, maclen: %d
keylen: %d, minlen: %d, ivlen: %d, maclen: %d
ciphersuite %s is not available
ciphersuite %s is not available
key block
key block
ciphersuite = %s
ciphersuite = %s
key expansion
key expansion
=> derive keys
=> derive keys
1.0.0
1.0.0
PolarSSL 1.0.0
PolarSSL 1.0.0
M-----
M-----
------
------
-----BEGIN PRIVATE KEY-----
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
-----END PRIVATE KEY-----
-----BEGIN PUBLIC KEY-----
-----BEGIN PUBLIC KEY-----
-----END PUBLIC KEY-----
-----END PUBLIC KEY-----
0xX=
0xX=
X%s
X%s
%sRSA key size : %d bits
%sRSA key size : %d bits
%ssigned using : RSA
%ssigned using : RSA
%sexpires on : d-d-d d:d:d
%sexpires on : d-d-d d:d:d
%sissued on : d-d-d d:d:d
%sissued on : d-d-d d:d:d
%ssubject name :
%ssubject name :
%sissuer name :
%sissuer name :
%sserial number :
%sserial number :
%scert. version : %d
%scert. version : %d
TLS Web Client Authentication
TLS Web Client Authentication
TLS Web Server Authentication
TLS Web Server Authentication
%d.%d
%d.%d
revocation date: d-d-d d:d:d
revocation date: d-d-d d:d:d
%sserial number:
%sserial number:
%sRevoked certificates:
%sRevoked certificates:
%snext update : d-d-d d:d:d
%snext update : d-d-d d:d:d
%sthis update : d-d-d d:d:d
%sthis update : d-d-d d:d:d
%sCRL version : %d
%sCRL version : %d
X.509 private key load:
X.509 private key load:
X.509 certificate load:
X.509 certificate load:
XTEA test #%d:
XTEA test #%d:
Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20100101 Firefox/11.0
Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20100101 Firefox/11.0
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player Plugin
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player Plugin
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX
System32\Macromed\Flash\mms.cfg
System32\Macromed\Flash\mms.cfg
%SystemRoot%\
%SystemRoot%\
/get/flashplayer/current/licensing/win/install_flash_player_11_active_x_32bit.exe
/get/flashplayer/current/licensing/win/install_flash_player_11_active_x_32bit.exe
/get/flashplayer/current/licensing/win/install_flash_player_11_plugin_32bit.exe
/get/flashplayer/current/licensing/win/install_flash_player_11_plugin_32bit.exe
fpdownload.macromedia.com
fpdownload.macromedia.com
\install_flash_player_11_plugin_32bit.exe
\install_flash_player_11_plugin_32bit.exe
\install_flash_player_11_active_x_32bit.exe
\install_flash_player_11_active_x_32bit.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ardownload.adobe.com
ardownload.adobe.com
/pub/adobe/reader/win/10.x/10.1.2/en_US/AdbeRdr1012_en_US.exe
/pub/adobe/reader/win/10.x/10.1.2/en_US/AdbeRdr1012_en_US.exe
\AdbeRdr1012_en_US.exe
\AdbeRdr1012_en_US.exe
\Common Files\Java\Java Update\jucheck.exe
\Common Files\Java\Java Update\jucheck.exe
https
https
hXXp://VVV.oracle.com/technetwork/java/javase/downloads/jre-6u31-download-1501637.html
hXXp://VVV.oracle.com/technetwork/java/javase/downloads/jre-6u31-download-1501637.html
download.oracle.com
download.oracle.com
/otn-pub/java/jdk/6u31-b05/jre-6u31-windows-i586.exe
/otn-pub/java/jdk/6u31-b05/jre-6u31-windows-i586.exe
\jre-6u31-windows-i586-s.exe
\jre-6u31-windows-i586-s.exe
%s=%s
%s=%s
Range: bytes=%d-%d
Range: bytes=%d-%d
Cookie:%s
Cookie:%s
Cache-Control: %s
Cache-Control: %s
Connection: %s
Connection: %s
Content-Length: %d
Content-Length: %d
Host: %s
Host: %s
Accept-Encoding: %s
Accept-Encoding: %s
Content-Type: %s
Content-Type: %s
User-Agent: %s
User-Agent: %s
Accept-Language: %s
Accept-Language: %s
Referer: %s
Referer: %s
Accept: %s
Accept: %s
%s %s HTTP/1.1
%s %s HTTP/1.1
Test Using Larger Than Block-Size Key - Hash Key First
Test Using Larger Than Block-Size Key - Hash Key First
Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data
Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data
This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.
This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.
gpw_e24=http://VVV.oracle.com/technetwork/java/javase/downloads/jre-6u31-download-1501637.html
gpw_e24=http://VVV.oracle.com/technetwork/java/javase/downloads/jre-6u31-download-1501637.html
s_sq=[[B]];
s_sq=[[B]];
%s=%s;
%s=%s;
GetProcessHeap
GetProcessHeap
CreateIoCompletionPort
CreateIoCompletionPort
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyA
RegCreateKeyExA
RegCreateKeyExA
RegCloseKey
RegCloseKey
.text
.text
`.rdata
`.rdata
@.data
@.data
.idata
.idata
.reloc
.reloc
wmiprvse.exe_756_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%System%\config\systemprofile\Local Settings\Application Data\iwmikkry.log
%System%\config\systemprofile\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
services.exe_764_rwx_20210000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
lsass.exe_776_rwx_20570000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QX .QX hSX B^X ']X
QX .QX hSX B^X ']X
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%System%\config\systemprofile\Local Settings\Application Data\iwmikkry.log
%System%\config\systemprofile\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
svchost.exe_960_rwx_20570000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QX .QX hSX B^X ']X
QX .QX hSX B^X ']X
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%System%\config\systemprofile\Local Settings\Application Data\iwmikkry.log
%System%\config\systemprofile\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
svchost.exe_1028_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\NetworkService\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\NetworkService\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
svchost.exe_1116_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
wurlmon.dll
wurlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\NetworkService\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\NetworkService\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
svchost.exe_1160_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\NetworkService\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\NetworkService\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
svchost.exe_1268_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
wurlmon.dll
wurlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
spoolsv.exe_1448_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
Explorer.EXE_1684_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
wurlmon.dll
wurlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\%current user%\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\%current user%\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password:
jqs.exe_1972_rwx_20590000_00037000:
Gh.logWj
Gh.logWj
h.logPj
h.logPj
tcPR
tcPR
h.exe
h.exe
user32.dll
user32.dll
kernel32.dll
kernel32.dll
|GetWindowsDirectoryA
|GetWindowsDirectoryA
{X-X-X-X-XX}
{X-X-X-X-XX}
ntdll.dll
ntdll.dll
shlwapi.dll
shlwapi.dll
SHDeleteKeyA
SHDeleteKeyA
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
shell32.dll
shell32.dll
?456789:;
?456789:;
!"#$%&'()* ,-./0123
!"#$%&'()* ,-./0123
ws2_32.dll
ws2_32.dll
HTTP/*.*
HTTP/*.*
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
/HTTPMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Referer: %s
Referer: %s
Content-Type: multipart/form-data; boundary=%s
Content-Type: multipart/form-data; boundary=%s
Content-Length: %d
Content-Length: %d
Content-Disposition: form-data; name="%s"
Content-Disposition: form-data; name="%s"
--%s--
--%s--
%s /%s HTTP/1.1
%s /%s HTTP/1.1
Host: %s
Host: %s
User-Agent: %s
User-Agent: %s
%sAccept-Language: %s
%sAccept-Language: %s
HTTP/1.x 301 Moved Permanently
HTTP/1.x 301 Moved Permanently
Server: Apache/2.2.14
Server: Apache/2.2.14
advapi32.dll
advapi32.dll
%CommonProgramFiles%
%CommonProgramFiles%
\/*.*
\/*.*
winlogon.exe
winlogon.exe
csrss.exe
csrss.exe
smss.exe
smss.exe
keyworddestination
keyworddestination
USER PASS
USER PASS
PORT
PORT
RapportGP.dll
RapportGP.dll
csshiftjis
csshiftjis
cswindows31j
cswindows31j
iso_646.irv:1991
iso_646.irv:1991
windows-1250
windows-1250
windows-1251
windows-1251
windows-1252
windows-1252
windows-1253
windows-1253
windows-1254
windows-1254
windows-1255
windows-1255
windows-1256
windows-1256
windows-1257
windows-1257
windows-1258
windows-1258
windows-874
windows-874
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
hostuser-agentoptionsgetheadpostputdeletetraceacceptaccept-charsetaccept-encodingaccept-languageauthorizationexpectfromhostif-modified-sinceif-matchif-none-matchif-rangeif-unmodifiedsincemax-forwardsproxy-authorizationrangerefererteuser-agent100101200201202203204205206300301302303304305306307400401402403404405406407408409410411412413414415416417500501502503504505accept-rangesageetaglocationproxy-authenticatepublicretry-afterservervarywarningwww-authenticateallowcontent-basecontent-encodingcache-controlconnectiondatetrailertransfer-encodingupgradeviawarningcontent-languagecontent-lengthcontent-locationcontent-md5content-rangecontent-typeetagexpireslast-modifiedset-cookieMondayTuesdayWednesdayThursdayFridaySaturdaySundayJanFebMarAprMayJunJulAugSepOctNovDecchunkedtext/htmlimage/pngimage/jpgimage/gifapplication/xmlapplication/xhtmltext/plainpublicmax-agecharset=iso-8859-1utf-8gzipdeflateHTTP/1.1statusversionurl
HTTP/1.1
HTTP/1.1
\\.\pipe\
\\.\pipe\
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
PTF://%s:%s@%s:%d/
PTF://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
pop3://%s:%s@%s:%d/
dnsapi.dll
dnsapi.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpOpenRequestW
HttpOpenRequestW
InternetOpenUrlA
InternetOpenUrlA
InternetOpenUrlW
InternetOpenUrlW
HttpSendRequestA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestW
HttpSendRequestExA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestExW
QZ .QZ hSZ B^Z ']Z
QZ .QZ hSZ B^Z ']Z
DeleteUrlCacheEntryW
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpQueryInfoA
HttpQueryInfoW
HttpQueryInfoW
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpAddRequestHeadersW
urlmon.dll
urlmon.dll
UrlMkGetSessionOption
UrlMkGetSessionOption
nss3.dll
nss3.dll
PR_OpenTCPSocket
PR_OpenTCPSocket
nspr4.dll
nspr4.dll
hXXps://hXXp://TE
hXXps://hXXp://TE
{49A21781-C39D-B603-C11E-00485360D01E}
{49A21781-C39D-B603-C11E-00485360D01E}
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
%Documents and Settings%\LocalService\Local Settings\Application Data\iwmikkry.log
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21783-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
{49A21782-C39D-B603-C11E-00485360D01E}
PeekNamedPipe
PeekNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
WaitNamedPipeA
WaitNamedPipeA
DisconnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
ConnectNamedPipe
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyA
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
.text
.text
`.rdata
`.rdata
@.data
@.data
.reloc
.reloc
|75001234
|75001234
PR_xTCPSh
PR_xTCPSh
wsock32.dll
wsock32.dll
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
multipart/*boundary={*}application/x-www-form-urlencodedname="{*}"{*}hXXps://hXXp://
keywords
keywords
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
alluniqcontrolexplicitASCIIUTF8UNICODE{keyword}
set_url
set_url
WebFilters
WebFilters
WebDataFilters
WebDataFilters
WebFakes
WebFakes
|0123456789
|0123456789
gzipdeflateContent-Type: application/x-www-form-urlencoded
gzipdeflateContent-Type: application/x-www-form-urlencoded
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Tdomain=google.ru&cookies=enabled&reason=1&auth=false
Cookie: User-Agent-Session: Basic login: Basic password:
Cookie: User-Agent-Session: Basic login: Basic password: