HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.GenericKD.2781233 (B) (Emsisoft), Trojan.GenericKD.2781233 (AdAware), Installer.Win32.InnoSetup.FD, Trojan.Win32.Iconomon.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)Behaviour: Trojan, Installer
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 5c66df3a010febf50861f8fd996a7f1d
SHA1: 99616ee3e0c199ec8e15e3cc1f22e2d60994326d
SHA256: 6f4b03342cea2ee132633e6132e2deceb2546eae5f50f8dead19b4d04abf51b7
SSDeep: 49152:UDBuuv5sjzaqhYvkJketNPHhDDthjRq54F6HQdj6wLvf 9AlpTS183q6hVlcNYwj:UDQuv5sjf6vckKJTVqg6HQdmwrWCHS1j
Size: 2580480 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2015-10-07 10:54:02
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
jew.tmp:1008
jew.exe:1412
jew.exe:628
The Trojan injects its code into the following process(es):
jew.tmp:228
%original file name%.exe:1016
%original file name%.exe:1012
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process jew.tmp:228 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\All Users\Application Data\52B4F3ED\VirtualFamiliesFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\MahjongFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\VirtualVillagersFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\EasyYoutbeDownloader.dat (3421 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\VclStylesInno.dll (15116 bytes)
%Documents and Settings%\All Users\Application Data\msupd\tsk.dat (2461 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\update.dat (7 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\BurgerShop2FullVersion.dat (3421 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\itdownload.dll (1281 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\EmeraldLightSlate.vsf (601 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\PoppitFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\msupd\dmp.dat (941 bytes)
%Documents and Settings%\All Users\Application Data\msupd\wmp.dat (24 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\SoftwareDownload.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\JewelQuestFullVersion.dat (3421 bytes)
The process jew.tmp:1008 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\VclStylesInno.dll (15116 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\itdownload.dll (1281 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\EmeraldLightSlate.vsf (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\VclStylesInno.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\_isetup (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\itdownload.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\_isetup\_shfoldr.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\EmeraldLightSlate.vsf (0 bytes)
The process jew.exe:1412 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-ECK7I.tmp\jew.tmp (7386 bytes)
The process jew.exe:628 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-ECTD5.tmp\jew.tmp (7386 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-ECTD5.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-ECTD5.tmp\jew.tmp (0 bytes)
The process %original file name%.exe:1016 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\NAT Service\natsv.exe (17627 bytes)
%Documents and Settings%\%current user%\Application Data\75ED9567-AA58-4C8E-A8EA-3CAD7C47AB03\run.dat (8 bytes)
%Program Files%\NAT Service\natsv.exe:ZONE.identifier (28 bytes)
The Trojan deletes the following file(s):
C:\%original file name%.exe:ZONE.identifier (0 bytes)
The process %original file name%.exe:1012 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\jew.exe (9606 bytes)
Registry activity
The process jew.tmp:228 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 28 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B0 8B 9E A5 32 DB E6 95 BD B3 11 7A C3 78 AE F6"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process jew.tmp:1008 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "18 07 48 C4 ED 4E 88 8F 65 1E 45 C7 A5 6C 20 A5"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process jew.exe:1412 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 3C DB AA 35 39 A2 55 DC 6D 6D E1 1F 70 F3 04"
The process jew.exe:628 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "94 56 8D 6D 2C 6B 5B 52 AA 9F 5E F6 64 7A 44 3C"
The process %original file name%.exe:1016 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 67 06 C5 15 AF 0E F6 37 D1 38 83 0B FB 0E 8B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NAT Service" = "%Program Files%\NAT Service\natsv.exe"
The process %original file name%.exe:1012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "00 6A 12 3E F2 1A C8 36 5C 7B A1 CE 92 FA A7 65"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"jew.exe" = "iCloud Activation Lock Bypass Tool"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Dropped PE files
MD5 | File path |
---|---|
8b4c48b2d060bd8a1a432521299a58d7 | c:\Documents and Settings\All Users\Application Data\52B4F3ED\SoftwareDownload.dat |
7d5556f50f0e33bff8d7488de8b54546 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-ECK7I.tmp\jew.tmp |
16d22d5492bda0e1ab73c78118a5b3fb | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-F2HRO.tmp\VclStylesInno.dll |
92dc6ef532fbb4a5c3201469a5b5eb63 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-F2HRO.tmp\_isetup\_shfoldr.dll |
d82a429efd885ca0f324dd92afb6b7b8 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-F2HRO.tmp\itdownload.dll |
8bdf3c6e23beb4d5bf4bbc0ccdd9095e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\jew.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
jew.tmp:1008
jew.exe:1412
jew.exe:628 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\All Users\Application Data\52B4F3ED\VirtualFamiliesFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\MahjongFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\VirtualVillagersFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\EasyYoutbeDownloader.dat (3421 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\VclStylesInno.dll (15116 bytes)
%Documents and Settings%\All Users\Application Data\msupd\tsk.dat (2461 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\update.dat (7 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\BurgerShop2FullVersion.dat (3421 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\itdownload.dll (1281 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-F2HRO.tmp\EmeraldLightSlate.vsf (601 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\PoppitFullVersion.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\msupd\dmp.dat (941 bytes)
%Documents and Settings%\All Users\Application Data\msupd\wmp.dat (24 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\SoftwareDownload.dat (3421 bytes)
%Documents and Settings%\All Users\Application Data\52B4F3ED\JewelQuestFullVersion.dat (3421 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\VclStylesInno.dll (15116 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\itdownload.dll (1281 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-T56E0.tmp\EmeraldLightSlate.vsf (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-ECK7I.tmp\jew.tmp (7386 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-ECTD5.tmp\jew.tmp (7386 bytes)
%Program Files%\NAT Service\natsv.exe (17627 bytes)
%Documents and Settings%\%current user%\Application Data\75ED9567-AA58-4C8E-A8EA-3CAD7C47AB03\run.dat (8 bytes)
%Program Files%\NAT Service\natsv.exe:ZONE.identifier (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jew.exe (9606 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NAT Service" = "%Program Files%\NAT Service\natsv.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 8192 | 2388212 | 2392064 | 5.5374 | 3e08436c1d83c398b8daa31970914fb0 |
.rsrc | 2400256 | 177328 | 180224 | 3.2968 | 71c66abc02ebd00b5c97ca585fab8ed0 |
.reloc | 2580480 | 12 | 4096 | 0.011373 | 0fea674bd17d876816eb7036ef50a23c |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/cmV2fGR8MHxzb2Z0d2FyZXw1MkI0RjN8c2V0dXAuZXhl | 178.32.55.109 |
hxxp://redirectofthescript.elasticbeanstalk.com/14487328860/14487328861/14487328864/?00284073473cD0vLiw1H2E5Ky84Ni8eaD0rLywuLiZuOykiZXFicWtpPWhybGw6KCwxLzI5ZTZcMzZdYDAuK2NsY1lqZGUraGJray9NQEE0X2JeJktWVGg9ZGNfNlY8Plh3LSkwNDE0Ly8xODctLS8yLTFfX2BkYmIuLjJcYDEsM2E0LiovMzJeYlw0MzUkXHVuWmplXGthbWM1T29fcXNab2UgR2ZvdFppaB9jaWxjZl1tXjpvXnF1cA | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487328890/14487328891/14487328894/14487328899/?14361269096ZmFxMTE9ajQxLSo0Im=E3MT&AyLTEdZjwuLyo0LyBlPSggZHRib3FqN19=&=0a2o5KywvNTMzXDhbMTVg&YC40LF1jZVho=Y2grZmhsZSZPPz8zYmJcL&ExQS2o8YmJiNlRCP1JuLyguMzQ0LTUyMi4vLC0xMD=Fd&ZWFeWWQtLDFfYC8yNFsrMCktMjVeYGI1LS=wmW&3NtXWpjYmxbZGU0TW5icXFg=cF8XSWVtc11pZiV&kY2NlZVtsYTptZHJvZyZ=gXW5q&Oi0=vJGppbDQrJV9saDwvIGtzNCszMDUxMjAyLzkdYXM5ZF9zNSw | |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/ZGxwfGR8MHxzb2Z0d2FyZXw1MkI0RjN8dXBkYXRlLmRhdA | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/poUmYafxvA33FGKJn0BN-g/1448733189/7f1ce8045f21244e6bd7998439a32f83 | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/ZGxwfGR8MHxzb2Z0d2FyZXw1MkI0RjN8dHNrLmRhdA | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/tz7Ls_qIhIkm1SnBC0Cy-g/1448733190/ebaf1c009768d18142f4a7cca5724ef2 | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/ZGxwfGR8NDB8c29mdHdhcmV8NTJCNEYzfGRtcC5kYXQ | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/HwWAz1TEY1d1hoFPMj8NBA/1448733190/5b8ced495a1cbdfc62c0d49ff34f1e8f | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/ZGxwfGR8NDB8c29mdHdhcmV8NTJCNEYzfHdtcC5kYXQ | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/QeA5fOGYn1gjYIkHHgyQcw/1448733191/4c518e1f35b135d40700743ae91139c4 | 178.32.55.109 |
hxxp://jmp2.in/revmahjongfullversion | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=2401&l=2326&n=1&filename=Mahjong | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487328930/ldm9/0ncjp/14487328939/?86153626206X1=&9zMi85b=j&cvNiotIGM4Ly=4&uKyRsNyotMTE=j&=aDsrJGZjZF9t&XGpfO0d=faGRnaG&YhZl1taDszKh5q=cW&c6KyRdbW43KSBzbjorMi42Ny=&=0qMjguI2FyN2Vlbi8s | |
hxxp://jmp2.in/revvirtualfamiliesfullversion | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14124&l=13255&n=1&filename=Virtual Families | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487328940/14487328941/up3fn/gm8j/?09660624658Z1xuMTI5bjkrMSg1HV43MS4v=&Li4hZD0oLSw1LyRqNyweZmBmX=&25ba2E3UWFya29bbB8wLEBcZWljY19zIGd=faW&k1MycganJmOy0gXmduNCs=gdG07LS4vMDcqLDI5LiRjbjhfZWsxLA | |
hxxp://jmp2.in/revvirtualvillagersfull | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14133&l=13259&n=1&filename=Virtual Villagers | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/aqjo7o6/14487328951/dxf3jn82fp/14487328959/?64275626174YWFyM=C&05bjcwLywvImI2LC4=vL&TIfaDctMSswMyRoPC=o&iYGVqXmlba188T2VscH=N&aZx8wKlViaGZdZV5tbS=RjY&mhqNy8uH2tsajcwH19pajs=qIW&5xNzAtMDIzMSszMzMgZm05YWFy=MC0 | |
hxxp://jmp2.in/revjewelquestfullversion | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=2402&l=2327&n=1&filename=JewelQuest | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/gl9kfevd/14487328961/14487328964/14487328969/?29980619789ZVxrLzI5bzQqLic=&zHVs1Mi4vKR9kNDAqKS8=&maDwoH15galxlWW1fPEF=eb&1xqSGxdc24lYFxnZTsqJx5wbGs0Kh5abWU=0K&SZucjQqLCs2LioqODM1HWBsNG=Vcay8y | |
hxxp://jmp2.in/revpoppitfullversion | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=2403&l=2328&n=1&filename=Poppit | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/gwqq5q/14487328971/e75n7/14487328979/?42487717141Y2Nw=Ly&s4bzYwMi8xJGA1Ky0vLCVo=P&C4xLjAfZzwqJWJoa=&GNqWWZePElubG9lciJh=&XGhtNjIsJWxwa=DUq&H2JobTkwInJvNS=otMzE2LzE0NzMeYG08YGRwNi4 | |
hxxp://jmp2.in/revyoutubedl | 46.4.101.88 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/setup.exe | 178.32.55.109 |
hxxp://redirectofthescript.elasticbeanstalk.com/downloadmanager/get?p=1605&d=22861&l=22051&n=1&exeurl=hxxp://easyyoutubedownloader.dl.freebytez.net/cnet_setup.exe&dynamicname=Easy Youtube Downloader&filename=setup | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487328990/t21fplm849/14487328994/14487328999/?46200228249Y19yNzI9bjUvMicxIGI9MjA2Li8i=YzksMDA1LyRmOy0dYXJjdXJqO2B&ycGchLV8lMmQjKmRhWG9zd291cnNaY2Bmc2hqb2FiY2osYGMqYHBlZWB3bGN2JW=&pf=ciUyZGFmY3BWb19ydXAsY3BjIlt1aF9taW&FsWWthNEFbcXklMC5RbXFrcVxjJTIuQmd1amNrW2JlciRkYWphZV1nYz1zY3JtbiJgX2lsPTMuJGhwaDQtIGFv=bjsvHnJvNC0uMjg3MTAwNzUdY247Z2VyNSo | |
hxxp://jmp2.in/revburgershop2full | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14134&l=13260&n=1&filename=Burger Shop 2 | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487329000/z78j/14487329004/o4yn613sv/?33091256576ZGJ0LjE=&9azcsLyoyI2Q0MDIsLS8fZjouMyk1LiFoOCog=&Y2ZsXG1=faF84O29vZGV&pJDArTWNoaiIvMCklZ15paTYtLS=NwaWs7L&CBeaGg6LiZrcjssLi8xMTAvOScvJGJu=OGBfcTQy | |
hxxp://jmp2.in/revluxor5fullversion | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14130&l=13256&n=1&filename=Luxor 5 | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487329010/14487329011/obdhze39/14487329019/?56508355938Yl9vN=y&o=8azgoMygwIF89KTEs&LicjZD=grLjItM&yFpNC4eYWNnZW=ZeaGA0SW1za&W0lKi0=wIWBgZ2k3Lj&AebW1nNC4eXmlpPSkjb2=&40LiwvMjIzKj=YrLB1kbDhhYHQvLw | |
hxxp://jmp2.in/revmontezuma3full | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14136&l=13262&n=1&filename=The Treasures of Montezuma 3 | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487329020/14487329021/14487329024/14487329029/?80775448129X2=VtM&C07bDUwNCctJl02=LD&AtKzUkYzU=xLCs&xLiJmPC8dXmllXmldaV0=8&Ul9dJS=spT25hWXJzaV1zHi&sra2IdMS5EZ=25t&XnVxaVkkMCc=&rJmJcamo5Ky8kZ2psNiohX2tmPC8=d&bHM2Ki8wNC8yMDAoMh9gb=zljXXM1KQ | |
hxxp://jmp2.in/revsherlockholmes2full | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14131&l=13257&n=1&filename=The Lost Cases of Sherlock Holmes 2 | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487329030/14487329031/14487329034/14487329039/?29765471620ZVxtMS07aTwrNDAzHV03LDAqM=&iskbDsoLCwwMx9tNy8mZGBlX=2ldZmQ&3UmhjHCsqR2tscx8wM=EFYbF9uISsvaWQlMCd&MYmBuZW=5daSUwJ0FpZ2lech8wMDAdY&l1qajYyKiRwcG=M2KyFfaG03LyZyajYrLzAxNi0wOS4qH2FvOWBkbjUy | |
hxxp://jmp2.in/revslingoquestfullversion | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14132&l=13258&n=1&filename=Slingo Quest | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487329040/14487329041/8duf7/14487329049/?11612384134ZmRu=NjA8aDk&wMyw0=JV48Lz&EpLzEjaDwwLTEzNR5qP=C4iZWhmZGxeZWE8UGhobWFuIy&8oTXRib3MlY2J=tazU&vLyNscWs3MCRgZ2=o8LiJzcjcwMjEwMzIvNS8zIGZyOl9hczQu | |
hxxp://jmp2.in/revturbopizzafull | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14135&l=13261&n=1&filename=Turbo Pizza | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/qm0zx8bc/6jfbdf/ngbdps6/c5pl46/?56760992334Yl9tMT=I&2ZzsuMywwIF0=&3MSsoMTIjaDgrLCw2KB1sOi4i=YW&NlX25=YZGM&6UXFtXGgfMi=dHZ3d3XS&FjXGluNCou=I21&uZzcqIGNmZTsuI3BuNyouNC8=uMS82LDAgYG49XlxyNC8 | |
hxxp://jmp2.in/revturbosubfull | 46.4.101.88 |
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=1605&d=14116&l=13306&n=1&filename=Turbo Sub | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/yn5gpvttd/14487329071/14487329074/14487329079/?32005594608ZGN0N=&y06=ZzkrNigyJGQ9LC8oLTAm&ZDovMzMrMR1qNzEeY2dsZ=WlcZGE3VG1vYG8lLS&tKcVwmYWBtbj0uK=x1sbGw1LiR&j=b2k4KCJuczUuMjQ4Mi4pNSo3HmRyPWdgby4u | |
hxxp://redirectofthescript.elasticbeanstalk.com/14487329060/14487329061/14487329064/e1wx/vs51c/144873290625/144873290636/144873290649/bo00d/?97140309952ZzYwMjAyJls0LTAvLzAibDoyKScwLx1nPC0mYnhcbG1qNGFzcHA3LyYsMTMwXjdhYl44WVoyLFplZF1uYWwlY2RsYihjLnVUVFxGYnhQaS9tRGdMW1h0XV9gLi00MTguKjEzJzAuNDcuNS5aL2ArXzMuMjNhKC8yLyovY15mYjMtXDAvXVolYHlrYWRgXmxYZmQ5U2xma25ccFwZSGpzcWFjYyFkYGVkamFqZTRqYHJsaQ | |
hxxp://runtimeall1109-11.elasticbeanstalk.com/14487329080/vtgxj/14487329084/elymu6zsj/?15188495067ZmBzLyo7ZzgxMCk0IWM1Ki4vMTEgZTwtMS=gtLR&1pPSsfZHNkbWpoNGN0bmk5Ki4tLjEwYDhfW2AzYVsvKlpnZVtnY2ctZGFqYipkLG5WT2RHX3ZQazBrPWlHY1lxW19iLy=stMzM2Ky4xJ&zIvMjAwMDZbLF4rYTQsKzVcMDAvLSoxZFxfZC=41XS0tXVwmXnJtXGxhW2pYaGU3TG5hc29ZblwbS&Whsc1xrZB5iYGdlaFpsYDxrXXBsayZjXG5pPCsoImdtbDcq=JV5uZjUtHW9zNyozLzcvKy4wKzggYHM4Zl1sMyk | |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/6L4GgjFfujpOUZlFhn6BSQ/1448733210/fff674ade9b97129adde2e016eb06bdd | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/Jq1lkZdIB998_dNdIsU9QA/1448733210/1170ae1a4a878cf3f7b12caaad7e40e4 | 178.32.55.109 |
hxxp://mjaxns0xms0yocaxos40oc4xma.securefiledl.link/thGDQ-vCUEoMRVpt7U0c9Q/1448733211/d5b6db43cddb2e86269ca59134f0cd26 | 178.32.55.109 |
hxxp://get.FILE155DESKTOPSCR.INFO/downloadmanager/get?p=1605&d=22861&l=22051&n=1&exeurl=hxxp://easyyoutubedownloader.dl.freebytez.net/cnet_setup.exe&dynamicname=Easy Youtube Downloader&filename=setup | |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14132&l=13258&n=1&filename=Slingo Quest | 50.17.193.226 |
hxxp://easyyoutubedownloader.dl.freebytez.net/setup.exe | 178.32.55.109 |
hxxp://get.file262desktop.info/14487329060/14487329061/14487329064/e1wx/vs51c/144873290625/144873290636/144873290649/bo00d/?97140309952ZzYwMjAyJls0LTAvLzAibDoyKScwLx1nPC0mYnhcbG1qNGFzcHA3LyYsMTMwXjdhYl44WVoyLFplZF1uYWwlY2RsYihjLnVUVFxGYnhQaS9tRGdMW1h0XV9gLi00MTguKjEzJzAuNDcuNS5aL2ArXzMuMjNhKC8yLyovY15mYjMtXDAvXVolYHlrYWRgXmxYZmQ5U2xma25ccFwZSGpzcWFjYyFkYGVkamFqZTRqYHJsaQ | 50.17.193.226 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14131&l=13257&n=1&filename=The Lost Cases of Sherlock Holmes 2 | 50.17.193.226 |
hxxp://get.0140h.info/14487329020/14487329021/14487329024/14487329029/?80775448129X2=VtM&C07bDUwNCctJl02=LD&AtKzUkYzU=xLCs&xLiJmPC8dXmllXmldaV0=8&Ul9dJS=spT25hWXJzaV1zHi&sra2IdMS5EZ=25t&XnVxaVkkMCc=&rJmJcamo5Ky8kZ2psNiohX2tmPC8=d&bHM2Ki8wNC8yMDAoMh9gb=zljXXM1KQ | 54.225.163.126 |
hxxp://5659e8d9a3ee0.cleandl.link/poUmYafxvA33FGKJn0BN-g/1448733189/7f1ce8045f21244e6bd7998439a32f83 | 178.32.55.109 |
hxxp://get.0140h.info/14487329000/z78j/14487329004/o4yn613sv/?33091256576ZGJ0LjE=&9azcsLyoyI2Q0MDIsLS8fZjouMyk1LiFoOCog=&Y2ZsXG1=faF84O29vZGV&pJDArTWNoaiIvMCklZ15paTYtLS=NwaWs7L&CBeaGg6LiZrcjssLi8xMTAvOScvJGJu=OGBfcTQy | 54.225.163.126 |
hxxp://get.0140h.info/14487328890/14487328891/14487328894/14487328899/?14361269096ZmFxMTE9ajQxLSo0Im=E3MT&AyLTEdZjwuLyo0LyBlPSggZHRib3FqN19=&=0a2o5KywvNTMzXDhbMTVg&YC40LF1jZVho=Y2grZmhsZSZPPz8zYmJcL&ExQS2o8YmJiNlRCP1JuLyguMzQ0LTUyMi4vLC0xMD=Fd&ZWFeWWQtLDFfYC8yNFsrMCktMjVeYGI1LS=wmW&3NtXWpjYmxbZGU0TW5icXFg=cF8XSWVtc11pZiV&kY2NlZVtsYTptZHJvZyZ=gXW5q&Oi0=vJGppbDQrJV9saDwvIGtzNCszMDUxMjAyLzkdYXM5ZF9zNSw | 54.225.163.126 |
hxxp://get.0140h.info/14487329010/14487329011/obdhze39/14487329019/?56508355938Yl9vN=y&o=8azgoMygwIF89KTEs&LicjZD=grLjItM&yFpNC4eYWNnZW=ZeaGA0SW1za&W0lKi0=wIWBgZ2k3Lj&AebW1nNC4eXmlpPSkjb2=&40LiwvMjIzKj=YrLB1kbDhhYHQvLw | 54.225.163.126 |
hxxp://5659e8dae7ffc.cleandl.link/HwWAz1TEY1d1hoFPMj8NBA/1448733190/5b8ced495a1cbdfc62c0d49ff34f1e8f | 178.32.55.109 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14124&l=13255&n=1&filename=Virtual Families | 50.17.193.226 |
hxxp://5659e8efefb97.cleandl.link/thGDQ-vCUEoMRVpt7U0c9Q/1448733211/d5b6db43cddb2e86269ca59134f0cd26 | 178.32.55.109 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14133&l=13259&n=1&filename=Virtual Villagers | 50.17.193.226 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14130&l=13256&n=1&filename=Luxor 5 | 50.17.193.226 |
hxxp://get.0140h.info/gwqq5q/14487328971/e75n7/14487328979/?42487717141Y2Nw=Ly&s4bzYwMi8xJGA1Ky0vLCVo=P&C4xLjAfZzwqJWJoa=&GNqWWZePElubG9lciJh=&XGhtNjIsJWxwa=DUq&H2JobTkwInJvNS=otMzE2LzE0NzMeYG08YGRwNi4 | 54.225.163.126 |
hxxp://get.0140h.info/aqjo7o6/14487328951/dxf3jn82fp/14487328959/?64275626174YWFyM=C&05bjcwLywvImI2LC4=vL&TIfaDctMSswMyRoPC=o&iYGVqXmlba188T2VscH=N&aZx8wKlViaGZdZV5tbS=RjY&mhqNy8uH2tsajcwH19pajs=qIW&5xNzAtMDIzMSszMzMgZm05YWFy=MC0 | 54.225.163.126 |
hxxp://get.0140h.info/14487328990/t21fplm849/14487328994/14487328999/?46200228249Y19yNzI9bjUvMicxIGI9MjA2Li8i=YzksMDA1LyRmOy0dYXJjdXJqO2B&ycGchLV8lMmQjKmRhWG9zd291cnNaY2Bmc2hqb2FiY2osYGMqYHBlZWB3bGN2JW=&pf=ciUyZGFmY3BWb19ydXAsY3BjIlt1aF9taW&FsWWthNEFbcXklMC5RbXFrcVxjJTIuQmd1amNrW2JlciRkYWphZV1nYz1zY3JtbiJgX2lsPTMuJGhwaDQtIGFv=bjsvHnJvNC0uMjg3MTAwNzUdY247Z2VyNSo | 54.225.163.126 |
hxxp://5659e8ee59b51.cleandl.link/6L4GgjFfujpOUZlFhn6BSQ/1448733210/fff674ade9b97129adde2e016eb06bdd | 178.32.55.109 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14116&l=13306&n=1&filename=Turbo Sub | 50.17.193.226 |
hxxp://get.0140h.info/14487328930/ldm9/0ncjp/14487328939/?86153626206X1=&9zMi85b=j&cvNiotIGM4Ly=4&uKyRsNyotMTE=j&=aDsrJGZjZF9t&XGpfO0d=faGRnaG&YhZl1taDszKh5q=cW&c6KyRdbW43KSBzbjorMi42Ny=&=0qMjguI2FyN2Vlbi8s | 54.225.163.126 |
hxxp://get.file262desktop.info/14487328860/14487328861/14487328864/?00284073473cD0vLiw1H2E5Ky84Ni8eaD0rLywuLiZuOykiZXFicWtpPWhybGw6KCwxLzI5ZTZcMzZdYDAuK2NsY1lqZGUraGJray9NQEE0X2JeJktWVGg9ZGNfNlY8Plh3LSkwNDE0Ly8xODctLS8yLTFfX2BkYmIuLjJcYDEsM2E0LiovMzJeYlw0MzUkXHVuWmplXGthbWM1T29fcXNab2UgR2ZvdFppaB9jaWxjZl1tXjpvXnF1cA | 50.17.193.226 |
hxxp://5659e8da2cdb8.cleandl.link/tz7Ls_qIhIkm1SnBC0Cy-g/1448733190/ebaf1c009768d18142f4a7cca5724ef2 | 178.32.55.109 |
hxxp://get.0140h.info/gl9kfevd/14487328961/14487328964/14487328969/?29980619789ZVxrLzI5bzQqLic=&zHVs1Mi4vKR9kNDAqKS8=&maDwoH15galxlWW1fPEF=eb&1xqSGxdc24lYFxnZTsqJx5wbGs0Kh5abWU=0K&SZucjQqLCs2LioqODM1HWBsNG=Vcay8y | 54.225.163.126 |
hxxp://5659e8db82b84.cleandl.link/QeA5fOGYn1gjYIkHHgyQcw/1448733191/4c518e1f35b135d40700743ae91139c4 | 178.32.55.109 |
hxxp://get.0140h.info/14487329040/14487329041/8duf7/14487329049/?11612384134ZmRu=NjA8aDk&wMyw0=JV48Lz&EpLzEjaDwwLTEzNR5qP=C4iZWhmZGxeZWE8UGhobWFuIy&8oTXRib3MlY2J=tazU&vLyNscWs3MCRgZ2=o8LiJzcjcwMjEwMzIvNS8zIGZyOl9hczQu | 54.225.163.126 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=2401&l=2326&n=1&filename=Mahjong | 50.17.193.226 |
hxxp://get.0140h.info/14487329080/vtgxj/14487329084/elymu6zsj/?15188495067ZmBzLyo7ZzgxMCk0IWM1Ki4vMTEgZTwtMS=gtLR&1pPSsfZHNkbWpoNGN0bmk5Ki4tLjEwYDhfW2AzYVsvKlpnZVtnY2ctZGFqYipkLG5WT2RHX3ZQazBrPWlHY1lxW19iLy=stMzM2Ky4xJ&zIvMjAwMDZbLF4rYTQsKzVcMDAvLSoxZFxfZC=41XS0tXVwmXnJtXGxhW2pYaGU3TG5hc29ZblwbS&Whsc1xrZB5iYGdlaFpsYDxrXXBsayZjXG5pPCsoImdtbDcq=JV5uZjUtHW9zNyozLzcvKy4wKzggYHM4Zl1sMyk | 54.225.163.126 |
hxxp://get.0140h.info/qm0zx8bc/6jfbdf/ngbdps6/c5pl46/?56760992334Yl9tMT=I&2ZzsuMywwIF0=&3MSsoMTIjaDgrLCw2KB1sOi4i=YW&NlX25=YZGM&6UXFtXGgfMi=dHZ3d3XS&FjXGluNCou=I21&uZzcqIGNmZTsuI3BuNyouNC8=uMS82LDAgYG49XlxyNC8 | 54.225.163.126 |
hxxp://5659e8eeb960b.cleandl.link/Jq1lkZdIB998_dNdIsU9QA/1448733210/1170ae1a4a878cf3f7b12caaad7e40e4 | 178.32.55.109 |
hxxp://get.0140h.info/14487328940/14487328941/up3fn/gm8j/?09660624658Z1xuMTI5bjkrMSg1HV43MS4v=&Li4hZD0oLSw1LyRqNyweZmBmX=&25ba2E3UWFya29bbB8wLEBcZWljY19zIGd=faW&k1MycganJmOy0gXmduNCs=gdG07LS4vMDcqLDI5LiRjbjhfZWsxLA | 54.225.163.126 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=2402&l=2327&n=1&filename=JewelQuest | 50.17.193.226 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14136&l=13262&n=1&filename=The Treasures of Montezuma 3 | 50.17.193.226 |
hxxp://get.0140h.info/yn5gpvttd/14487329071/14487329074/14487329079/?32005594608ZGN0N=&y06=ZzkrNigyJGQ9LC8oLTAm&ZDovMzMrMR1qNzEeY2dsZ=WlcZGE3VG1vYG8lLS&tKcVwmYWBtbj0uK=x1sbGw1LiR&j=b2k4KCJuczUuMjQ4Mi4pNSo3HmRyPWdgby4u | 54.225.163.126 |
hxxp://get.0140h.info/14487329030/14487329031/14487329034/14487329039/?29765471620ZVxtMS07aTwrNDAzHV03LDAqM=&iskbDsoLCwwMx9tNy8mZGBlX=2ldZmQ&3UmhjHCsqR2tscx8wM=EFYbF9uISsvaWQlMCd&MYmBuZW=5daSUwJ0FpZ2lech8wMDAdY&l1qajYyKiRwcG=M2KyFfaG03LyZyajYrLzAxNi0wOS4qH2FvOWBkbjUy | 54.225.163.126 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14134&l=13260&n=1&filename=Burger Shop 2 | 50.17.193.226 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14135&l=13261&n=1&filename=Turbo Pizza | 50.17.193.226 |
hxxp://get.file20desktop.com/DownloadManager/Get?p=1605&d=2403&l=2328&n=1&filename=Poppit | 50.17.193.226 |
get.file155desktopscr.info | 50.17.193.226 |
lucid.no-ip.info | 207.224.115.89 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /14487329080/vtgxj/14487329084/elymu6zsj/?15188495067ZmBzLyo7ZzgxMCk0IWM1Ki4vMTEgZTwtMS=gtLR&1pPSsfZHNkbWpoNGN0bmk5Ki4tLjEwYDhfW2AzYVsvKlpnZVtnY2ctZGFqYipkLG5WT2RHX3ZQazBrPWlHY1lxW19iLy=stMzM2Ky4xJ&zIvMjAwMDZbLF4rYTQsKzVcMDAvLSoxZFxfZC=41XS0tXVwmXnJtXGxhW2pYaGU3TG5hc29ZblwbS&Whsc1xrZB5iYGdlaFpsYDxrXXBsayZjXG5pPCsoImdtbDcq=JV5uZjUtHW9zNyozLzcvKy4wKzggYHM4Zl1sMyk HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
Content-Type: text/html; charset=utf-8
Content-Length: 513
<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="hXXp://get.0140h.info/14487329080/vtgxj/14487329084/elymu6zsj/?15188495067ZmBzLyo7ZzgxMCk0IWM1Ki4vMTEgZTwtMS=gtLR&1pPSsfZHNkbWpoNGN0bmk5Ki4tLjEwYDhfW2AzYVsvKlpnZVtnY2ctZGFqYipkLG5WT2RHX3ZQazBrPWlHY1lxW19iLy=stMzM2Ky4xJ&zIvMjAwMDZbLF4rYTQsKzVcMDAvLSoxZFxfZC=41XS0tXVwmXnJtXGxhW2pYaGU3TG5hc29ZblwbS&Whsc1xrZB5iYGdlaFpsYDxrXXBsayZjXG5pPCsoImdtbDcq=JV5uZjUtHW9zNyozLzcvKy4wKzggYHM4Zl1sMyk">here</a>.</h2>
</body></html>
HTTP/1.1 200 OK
Cache-Control: max - age = 466
content-disposition: attachment;filename="setup.exe"
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:27 GMT
ETag: ac3be4fb-790e-497d-97e2-cb9a11f2aafa
Last-Modified: 11/28/2015 5:48:28 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 347808
Connection: Close
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^....... ...0.......p....@..........................................................................t..........X............B...............................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X............v..............@....ndata....... ...........................rsrc...X............z..............@..@........................................................................................................................................................................................................................................................................................................................................................................U....\.}..t .}.F.E.u..H....h.E..H.P.u..u..u...Hr@..B...SV.5p.E..E.WP.u...Lr@..e...E..E.P.u...Pr@..}..e....Dp@........FR..VV..U... M.......M....3.....FQ.....NU..M..........VT..U.....FP..E...............E.P.M...Hp@..E...E.P.E.P.u...Tr@..u....E..9}...w....~X.te.v4..Lp@....E.tU.}.j.W.E......E.......Pp@..vXW..Tp@..u..5Xp@.W...E..E.h ...Pj.h`.D.W..Xr@..u.W...u....E.P.u...\r@._^3.[.....L$....E...Si.. ..VW.T.....tO.q.3.;5..E.sB..i.. ...D.......t.G.....t...O..t .....u...3....3...F.. ..;5..E.r._^[...U..QQ.U.SV..i.. .
<<< skipped >>>
HEAD /revturbopizzafull HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:24 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14135&l=13261&n=1&filename=Turbo Pizza
HEAD /DownloadManager/Get?p=1605&d=14134&l=13260&n=1&filename=Burger Shop 2 HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 351
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:20 GMT
Location: hXXp://get.0140h.info/14487329000/z78j/14487329004/o4yn613sv/?33091256576ZGJ0LjE=&9azcsLyoyI2Q0MDIsLS8fZjouMyk1LiFoOCog=&Y2ZsXG1=faF84O29vZGV&pJDArTWNoaiIvMCklZ15paTYtLS=NwaWs7L&CBeaGg6LiZrcjssLi8xMTAvOScvJGJu=OGBfcTQy
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /14487329020/14487329021/14487329024/14487329029/?80775448129X2=VtM&C07bDUwNCctJl02=LD&AtKzUkYzU=xLCs&xLiJmPC8dXmllXmldaV0=8&Ul9dJS=spT25hWXJzaV1zHi&sra2IdMS5EZ=25t&XnVxaVkkMCc=&rJmJcamo5Ky8kZ2psNiohX2tmPC8=d&bHM2Ki8wNC8yMDAoMh9gb=zljXXM1KQ HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 70
content-disposition: attachment;filename="The Treasures of Montezuma 3.exe"
Content-Length: 347664
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:21 GMT
ETag: 0bd9ce95-ee2a-45d5-aac2-971c915c348f
Last-Modified: 11/28/2015 5:48:22 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /gwqq5q/14487328971/e75n7/14487328979/?42487717141Y2Nw=Ly&s4bzYwMi8xJGA1Ky0vLCVo=P&C4xLjAfZzwqJWJoa=&GNqWWZePElubG9lciJh=&XGhtNjIsJWxwa=DUq&H2JobTkwInJvNS=otMzE2LzE0NzMeYG08YGRwNi4 HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 954
content-disposition: attachment;filename="Poppit.exe"
Content-Length: 347672
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:16 GMT
ETag: 2074a602-1faa-4da3-8de5-20a91ab4b82f
Last-Modified: 11/28/2015 5:48:16 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /ZGxwfGR8NDB8c29mdHdhcmV8NTJCNEYzfGRtcC5kYXQ HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:10 GMT
Content-Type: text/html
Connection: close
Set-Cookie: _pk_ses.40.2929=*; expires=Sat, 28-Nov-2015 18:18:10 GMT; path=/
Set-Cookie: _pk_id.40.2929=236d1506051b0b44.1448732890.1.1448732890..; expires=Mon, 27-Nov-2017 17:48:10 GMT; path=/
Set-Cookie: _pk_cvar.40.2929=false; expires=Sat, 28-Nov-2015 18:18:10 GMT; path=/
LOCATION: hXXp://5659e8dae7ffc.cleandl.link/HwWAz1TEY1d1hoFPMj8NBA/1448733190/5b8ced495a1cbdfc62c0d49ff34f1e8f
HEAD /DownloadManager/Get?p=1605&d=14116&l=13306&n=1&filename=Turbo Sub HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 350
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:26 GMT
Location: hXXp://get.0140h.info/yn5gpvttd/14487329071/14487329074/14487329079/?32005594608ZGN0N=&y06=ZzkrNigyJGQ9LC8oLTAm&ZDovMzMrMR1qNzEeY2dsZ=WlcZGE3VG1vYG8lLS&tKcVwmYWBtbj0uK=x1sbGw1LiR&j=b2k4KCJuczUuMjQ4Mi4pNSo3HmRyPWdgby4u
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
GET /Jq1lkZdIB998_dNdIsU9QA/1448733210/1170ae1a4a878cf3f7b12caaad7e40e4 HTTP/1.0
Host: 5659e8eeb960b.cleandl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 28 Nov 2015 17:48:31 GMT
Content-Type: application/octet-stream
Connection: close
Content-Length: 239616
Content-Disposition: attachment; filename="tsk.dat"
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....}:U...........!..................... ........... ...............................|....@.....................................K....... ............................................................................ ............... ..H............text...4.... ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H............7..........p5...M..P ...................................... 9j..].. .`..k...rD...../:.,v)....)/cMM ..2.<.r..<....g=....-9.}..JQ...P=.....Q< .c.'~.-p...I.....$..R...L..i..=-...].....U.D.-.6.{..........*.*.0...........o1.....(8...o9...%.,r.r...p(:...-).r#..p(:...- .r9..p(:...--.rQ..p(:...-/ <...o....}.... 3...o....}.... $...o....}.... ....o....}.... .s;...z.(<...&.{....o=...o>..... M..(?.....{....o8.... . ....{................{.....o@......oA...&....oB...z&....(C...-....... ...o......{....oD...*..(......:...i.......:...........Z........0...........(....(.......o.....*6..o....o....*V.{....,..{....(<...&*v.u....,...t....o....*..(E...*..(.....o....3..o.....o....(:...*.*V.(I.....}J.....}K...*..{J...*..{K...*.0..U.......sL.....ru..poM...&..{J...."...oN...&.r...poM...&..{K....#...oN...&.r...poM...&.oO...*....0..;........u!.....,/(P....{J....{J...oQ...,.(R....{K....{K...oS...*.*..0..:....... .dd.. )UU..Z(P....{J...oT...X. )UU..Z(R....{K...oU...X..*^.(.....o....sV...oW...*..{..
<<< skipped >>>
HEAD /ZGxwfGR8MHxzb2Z0d2FyZXw1MkI0RjN8dHNrLmRhdA HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:10 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://5659e8da2cdb8.cleandl.link/tz7Ls_qIhIkm1SnBC0Cy-g/1448733190/ebaf1c009768d18142f4a7cca5724ef2
HEAD /DownloadManager/Get?p=1605&d=14135&l=13261&n=1&filename=Turbo Pizza HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 350
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:25 GMT
Location: hXXp://get.0140h.info/qm0zx8bc/6jfbdf/ngbdps6/c5pl46/?56760992334Yl9tMT=I&2ZzsuMywwIF0=&3MSsoMTIjaDgrLCw2KB1sOi4i=YW&NlX25=YZGM&6UXFtXGgfMi=dHZ3d3XS&FjXGluNCou=I21&uZzcqIGNmZTsuI3BuNyouNC8=uMS82LDAgYG49XlxyNC8
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /revslingoquestfullversion HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:23 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14132&l=13258&n=1&filename=Slingo Quest
HEAD /DownloadManager/Get?p=1605&d=14131&l=13257&n=1&filename=The Lost Cases of Sherlock Holmes 2 HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 400
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:23 GMT
Location: hXXp://get.0140h.info/14487329030/14487329031/14487329034/14487329039/?29765471620ZVxtMS07aTwrNDAzHV03LDAqM=&iskbDsoLCwwMx9tNy8mZGBlX=2ldZmQ&3UmhjHCsqR2tscx8wM=EFYbF9uISsvaWQlMCd&MYmBuZW=5daSUwJ0FpZ2lech8wMDAdY&l1qajYyKiRwcG=M2KyFfaG03LyZyajYrLzAxNi0wOS4qH2FvOWBkbjUy
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /QeA5fOGYn1gjYIkHHgyQcw/1448733191/4c518e1f35b135d40700743ae91139c4 HTTP/1.0
Host: 5659e8db82b84.cleandl.link
Cookie: _pk_ses.40.2929=*; _pk_id.40.2929=7753cd5b1bf336cf.1448732891.1.1448732891..; _pk_cvar.40.2929=false
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 28 Nov 2015 17:48:11 GMT
Content-Type: application/octet-stream
Connection: close
Content-Length: 24064
Content-Disposition: attachment; filename="wmp.dat"
HEAD /revburgershop2full HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:19 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14134&l=13260&n=1&filename=Burger Shop 2
HEAD /14487329030/14487329031/14487329034/14487329039/?29765471620ZVxtMS07aTwrNDAzHV03LDAqM=&iskbDsoLCwwMx9tNy8mZGBlX=2ldZmQ&3UmhjHCsqR2tscx8wM=EFYbF9uISsvaWQlMCd&MYmBuZW=5daSUwJ0FpZ2lech8wMDAdY&l1qajYyKiRwcG=M2KyFfaG03LyZyajYrLzAxNi0wOS4qH2FvOWBkbjUy HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 131
content-disposition: attachment;filename="The Lost Cases of Sherlock Holmes 2.exe"
Content-Length: 347680
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:22 GMT
ETag: a87280ad-ebd0-4121-9c89-b88174ec788b
Last-Modified: 11/28/2015 5:48:23 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /ZGxwfGR8NDB8c29mdHdhcmV8NTJCNEYzfHdtcC5kYXQ HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:11 GMT
Content-Type: text/html
Connection: close
Set-Cookie: _pk_ses.40.2929=*; expires=Sat, 28-Nov-2015 18:18:11 GMT; path=/
Set-Cookie: _pk_id.40.2929=7753cd5b1bf336cf.1448732891.1.1448732891..; expires=Mon, 27-Nov-2017 17:48:11 GMT; path=/
Set-Cookie: _pk_cvar.40.2929=false; expires=Sat, 28-Nov-2015 18:18:11 GMT; path=/
LOCATION: hXXp://5659e8db82b84.cleandl.link/QeA5fOGYn1gjYIkHHgyQcw/1448733191/4c518e1f35b135d40700743ae91139c4
HEAD /DownloadManager/Get?p=1605&d=14130&l=13256&n=1&filename=Luxor 5 HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 359
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:21 GMT
Location: hXXp://get.0140h.info/14487329010/14487329011/obdhze39/14487329019/?56508355938Yl9vN=y&o=8azgoMygwIF89KTEs&LicjZD=grLjItM&yFpNC4eYWNnZW=ZeaGA0SW1za&W0lKi0=wIWBgZ2k3Lj&AebW1nNC4eXmlpPSkjb2=&40LiwvMjIzKj=YrLB1kbDhhYHQvLw
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
GET /cmV2fGR8MHxzb2Z0d2FyZXw1MkI0RjN8c2V0dXAuZXhl HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:27 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file262desktop.info/14487329060/14487329061/14487329064/e1wx/vs51c/144873290625/144873290636/144873290649/bo00d/?97140309952ZzYwMjAyJls0LTAvLzAibDoyKScwLx1nPC0mYnhcbG1qNGFzcHA3LyYsMTMwXjdhYl44WVoyLFplZF1uYWwlY2RsYihjLnVUVFxGYnhQaS9tRGdMW1h0XV9gLi00MTguKjEzJzAuNDcuNS5aL2ArXzMuMjNhKC8yLyovY15mYjMtXDAvXVolYHlrYWRgXmxYZmQ5U2xma25ccFwZSGpzcWFjYyFkYGVkamFqZTRqYHJsaQ
HEAD /14487329040/14487329041/8duf7/14487329049/?11612384134ZmRu=NjA8aDk&wMyw0=JV48Lz&EpLzEjaDwwLTEzNR5qP=C4iZWhmZGxeZWE8UGhobWFuIy&8oTXRib3MlY2J=tazU&vLyNscWs3MCRgZ2=o8LiJzcjcwMjEwMzIvNS8zIGZyOl9hczQu HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 254
content-disposition: attachment;filename="Slingo Quest.exe"
Content-Length: 347664
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:23 GMT
ETag: 4653ab4e-7635-4006-b517-a7a4620838c7
Last-Modified: 11/28/2015 5:48:24 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /yn5gpvttd/14487329071/14487329074/14487329079/?32005594608ZGN0N=&y06=ZzkrNigyJGQ9LC8oLTAm&ZDovMzMrMR1qNzEeY2dsZ=WlcZGE3VG1vYG8lLS&tKcVwmYWBtbj0uK=x1sbGw1LiR&j=b2k4KCJuczUuMjQ4Mi4pNSo3HmRyPWdgby4u HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 938
content-disposition: attachment;filename="Turbo Sub.exe"
Content-Length: 347672
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:26 GMT
ETag: d0995840-1af1-4b88-807d-753737322452
Last-Modified: 11/28/2015 5:48:26 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /14487328890/14487328891/14487328894/14487328899/?14361269096ZmFxMTE9ajQxLSo0Im=E3MT&AyLTEdZjwuLyo0LyBlPSggZHRib3FqN19=&=0a2o5KywvNTMzXDhbMTVg&YC40LF1jZVho=Y2grZmhsZSZPPz8zYmJcL&ExQS2o8YmJiNlRCP1JuLyguMzQ0LTUyMi4vLC0xMD=Fd&ZWFeWWQtLDFfYC8yNFsrMCktMjVeYGI1LS=wmW&3NtXWpjYmxbZGU0TW5icXFg=cF8XSWVtc11pZiV&kY2NlZVtsYTptZHJvZyZ=gXW5q&Oi0=vJGppbDQrJV9saDwvIGtzNCszMDUxMjAyLzkdYXM5ZF9zNSw HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 76
content-disposition: attachment;filename="setup.exe"
Content-Length: 347816
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:08 GMT
ETag: 818fda6c-9149-43c6-b7ea-21721587b3a2
Last-Modified: 11/28/2015 5:48:09 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
GET /thGDQ-vCUEoMRVpt7U0c9Q/1448733211/d5b6db43cddb2e86269ca59134f0cd26 HTTP/1.0
Host: 5659e8efefb97.cleandl.link
Cookie: _pk_ses.40.2929=*; _pk_id.40.2929=d8fad8ce60cef2e1.1448732911.1.1448732911..; _pk_cvar.40.2929=false
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 28 Nov 2015 17:48:32 GMT
Content-Type: application/octet-stream
Connection: close
Content-Length: 95744
Content-Disposition: attachment; filename="dmp.dat"
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....UV.................f..........^.... ........@.. ....................................@.....................................S.......X............................................................................ ............... ..H............text...dd... ...f.................. ..`.rsrc...X............h..............@..@.reloc...............t..............@..B................@.......H........M..e6...........5..............................................:(M......(....*&...(....*N.(p.....3.*..(q...*.*2.((...(u...*z.,..{....,..{....o9.....(v...*^(.....(.....s....(....*j.(#....(......(G.........*z.,..{....,..{....o9.....(v...*..(....*.~....*.......*.~....*..(....*Vs%...(....t.........*....0..@........(......(....o.....o......o......s......o....&.o.....o......&..*........<<..0....0...........(....o....}......#(....o ...}......(....o ...}.....r...p}.....~!...}.....s"...}.....(#....(......i.1=.#........($.....(%.....(&.....('....(.....(.....((....()...*.(....s*.....o ....o,....o ...r...po-....o....&.r3..p(......&..s*.....o ....o,....o ...r...po-....o....&.r...p(......&..s*.....o ....o,....o ...r-..po-....o....&.r[..p(......&...{....r...p(/...(0...-3.{....r...p(/...s1......{....o2....o3....2...&.,.....}.....{....r...p(/...(4.......o5..... ...o6........(7...}......o8...-.....,...o9.....{......3..()... J.%{.....X}.....{....r...p(/...s1........|....(:...o2.....o3....{.....(......&...
<<< skipped >>>
GET /ZGxwfGR8MHxzb2Z0d2FyZXw1MkI0RjN8dHNrLmRhdA HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:30 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://5659e8eeb960b.cleandl.link/Jq1lkZdIB998_dNdIsU9QA/1448733210/1170ae1a4a878cf3f7b12caaad7e40e4
HEAD /14487329010/14487329011/obdhze39/14487329019/?56508355938Yl9vN=y&o=8azgoMygwIF89KTEs&LicjZD=grLjItM&yFpNC4eYWNnZW=ZeaGA0SW1za&W0lKi0=wIWBgZ2k3Lj&AebW1nNC4eXmlpPSkjb2=&40LiwvMjIzKj=YrLB1kbDhhYHQvLw HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 963
content-disposition: attachment;filename="Luxor 5.exe"
Content-Length: 347680
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:20 GMT
ETag: ab8735e9-59e5-474e-9a95-b38ee9a26ceb
Last-Modified: 11/28/2015 5:48:20 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /revjewelquestfullversion HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:15 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=2402&l=2327&n=1&filename=JewelQuest
GET /ZGxwfGR8MHxzb2Z0d2FyZXw1MkI0RjN8dXBkYXRlLmRhdA HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:30 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://5659e8ee59b51.cleandl.link/6L4GgjFfujpOUZlFhn6BSQ/1448733210/fff674ade9b97129adde2e016eb06bdd
HEAD /tz7Ls_qIhIkm1SnBC0Cy-g/1448733190/ebaf1c009768d18142f4a7cca5724ef2 HTTP/1.0
Host: 5659e8da2cdb8.cleandl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 28 Nov 2015 17:48:10 GMT
Content-Type: application/octet-stream
Connection: close
Content-Length: 239616
Content-Disposition: attachment; filename="tsk.dat"
HEAD /revluxor5fullversion HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:20 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14130&l=13256&n=1&filename=Luxor 5
HEAD /qm0zx8bc/6jfbdf/ngbdps6/c5pl46/?56760992334Yl9tMT=I&2ZzsuMywwIF0=&3MSsoMTIjaDgrLCw2KB1sOi4i=YW&NlX25=YZGM&6UXFtXGgfMi=dHZ3d3XS&FjXGluNCou=I21&uZzcqIGNmZTsuI3BuNyouNC8=uMS82LDAgYG49XlxyNC8 HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 580
content-disposition: attachment;filename="Turbo Pizza.exe"
Content-Length: 347680
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:24 GMT
ETag: 2c47817b-d7a4-4b69-a426-39ea81ca8524
Last-Modified: 11/28/2015 5:48:25 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /revpoppitfullversion HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:16 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=2403&l=2328&n=1&filename=Poppit
HEAD /DownloadManager/Get?p=1605&d=2403&l=2328&n=1&filename=Poppit HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 338
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:17 GMT
Location: hXXp://get.0140h.info/gwqq5q/14487328971/e75n7/14487328979/?42487717141Y2Nw=Ly&s4bzYwMi8xJGA1Ky0vLCVo=P&C4xLjAfZzwqJWJoa=&GNqWWZePElubG9lciJh=&XGhtNjIsJWxwa=DUq&H2JobTkwInJvNS=otMzE2LzE0NzMeYG08YGRwNi4
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /ZGxwfGR8MHxzb2Z0d2FyZXw1MkI0RjN8dXBkYXRlLmRhdA HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:09 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://5659e8d9a3ee0.cleandl.link/poUmYafxvA33FGKJn0BN-g/1448733189/7f1ce8045f21244e6bd7998439a32f83
HEAD /revturbosubfull HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:26 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14116&l=13306&n=1&filename=Turbo Sub
HEAD /gl9kfevd/14487328961/14487328964/14487328969/?29980619789ZVxrLzI5bzQqLic=&zHVs1Mi4vKR9kNDAqKS8=&maDwoH15galxlWW1fPEF=eb&1xqSGxdc24lYFxnZTsqJx5wbGs0Kh5abWU=0K&SZucjQqLCs2LioqODM1HWBsNG=Vcay8y HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 877
content-disposition: attachment;filename="JewelQuest.exe"
Content-Length: 347664
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:15 GMT
ETag: 3d351f6b-f3b6-4743-a364-b3aa8fb995c5
Last-Modified: 11/28/2015 5:48:15 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /downloadmanager/get?p=1605&d=22861&l=22051&n=1&exeurl=hXXp://easyyoutubedownloader.dl.freebytez.net/cnet_setup.exe&dynamicname=Easy Youtube Downloader&filename=setup HTTP/1.0
Host: get.FILE155DESKTOPSCR.INFO
Cookie: _pk_ses.40.1840=*; _pk_id.40.1840=f614868d881cfa7a.1448732897.1.1448732897..; _pk_cvar.40.1840=false
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 492
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:19 GMT
Location: hXXp://get.0140h.info/14487328990/t21fplm849/14487328994/14487328999/?46200228249Y19yNzI9bjUvMicxIGI9MjA2Li8i=YzksMDA1LyRmOy0dYXJjdXJqO2B&ycGchLV8lMmQjKmRhWG9zd291cnNaY2Bmc2hqb2FiY2osYGMqYHBlZWB3bGN2JW=&pf=ciUyZGFmY3BWb19ydXAsY3BjIlt1aF9taW&FsWWthNEFbcXklMC5RbXFrcVxjJTIuQmd1amNrW2JlciRkYWphZV1nYz1zY3JtbiJgX2lsPTMuJGhwaDQtIGFv=bjsvHnJvNC0uMjg3MTAwNzUdY247Z2VyNSo
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /DownloadManager/Get?p=1605&d=14136&l=13262&n=1&filename=The Treasures of Montezuma 3 HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 410
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:22 GMT
Location: hXXp://get.0140h.info/14487329020/14487329021/14487329024/14487329029/?80775448129X2=VtM&C07bDUwNCctJl02=LD&AtKzUkYzU=xLCs&xLiJmPC8dXmllXmldaV0=8&Ul9dJS=spT25hWXJzaV1zHi&sra2IdMS5EZ=25t&XnVxaVkkMCc=&rJmJcamo5Ky8kZ2psNiohX2tmPC8=d&bHM2Ki8wNC8yMDAoMh9gb=zljXXM1KQ
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /revyoutubedl HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:17 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://easyyoutubedownloader.dl.freebytez.net/setup.exe
HEAD /HwWAz1TEY1d1hoFPMj8NBA/1448733190/5b8ced495a1cbdfc62c0d49ff34f1e8f HTTP/1.0
Host: 5659e8dae7ffc.cleandl.link
Cookie: _pk_ses.40.2929=*; _pk_id.40.2929=236d1506051b0b44.1448732890.1.1448732890..; _pk_cvar.40.2929=false
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 28 Nov 2015 17:48:11 GMT
Content-Type: application/octet-stream
Connection: close
Content-Length: 95744
Content-Disposition: attachment; filename="dmp.dat"
HEAD /revvirtualfamiliesfullversion HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:13 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14124&l=13255&n=1&filename=Virtual Families
HEAD /DownloadManager/Get?p=1605&d=14133&l=13259&n=1&filename=Virtual Villagers HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 370
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:15 GMT
Location: hXXp://get.0140h.info/aqjo7o6/14487328951/dxf3jn82fp/14487328959/?64275626174YWFyM=C&05bjcwLywvImI2LC4=vL&TIfaDctMSswMyRoPC=o&iYGVqXmlba188T2VscH=N&aZx8wKlViaGZdZV5tbS=RjY&mhqNy8uH2tsajcwH19pajs=qIW&5xNzAtMDIzMSszMzMgZm05YWFy=MC0
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /DownloadManager/Get?p=1605&d=2401&l=2326&n=1&filename=Mahjong HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 355
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:12 GMT
Location: hXXp://get.0140h.info/14487328930/ldm9/0ncjp/14487328939/?86153626206X1=&9zMi85b=j&cvNiotIGM4Ly=4&uKyRsNyotMTE=j&=aDsrJGZjZF9t&XGpfO0d=faGRnaG&YhZl1taDszKh5q=cW&c6KyRdbW43KSBzbjorMi42Ny=&=0qMjguI2FyN2Vlbi8s
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /14487328930/ldm9/0ncjp/14487328939/?86153626206X1=&9zMi85b=j&cvNiotIGM4Ly=4&uKyRsNyotMTE=j&=aDsrJGZjZF9t&XGpfO0d=faGRnaG&YhZl1taDszKh5q=cW&c6KyRdbW43KSBzbjorMi42Ny=&=0qMjguI2FyN2Vlbi8s HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 726
content-disposition: attachment;filename="Mahjong.exe"
Content-Length: 347680
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:12 GMT
ETag: 0e3c24d3-0e28-4633-8aef-37429d198e64
Last-Modified: 11/28/2015 5:48:12 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
GET /6L4GgjFfujpOUZlFhn6BSQ/1448733210/fff674ade9b97129adde2e016eb06bdd HTTP/1.0
Host: 5659e8ee59b51.cleandl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 28 Nov 2015 17:48:30 GMT
Content-Type: application/octet-stream
Connection: close
Content-Length: 7680
Content-Disposition: attachment; filename="update.dat"
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........2M..aM..aM..a@.$aO..a@.&aL..a@..a^..a@..aO..a..2aH..aM..a`..a0..aO..a@."aL..a0.'aL..aRichM..a........PE..L......T............................ ........ ....@..........................`............@.................................."..P....@.......................P..x.... ..8...........................x!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc..x....P......................@..B........................................................................................................................................................................................................................................................................................................................................................U....4..0@.3..E.W.W..E........E.......E.f..E.j.f..E.f.E...f.}...oE.Pj..E........E.... @..W..E........E.j....E..E..E.....f..E.f.}...oE.Pj..E........E.... @..M.3._.......].......U.......H.....0@.3...$D...V.u..D$DW.}.h....PW... @.....9....D$HVP..` @........"....D$HPh !@..., @..5. @....h.......D$...........W... @.h.......W..D$..........f..D$.f.D$..D$ ...D$$j.f..D$8f.D$"....oD$.Pj..D$,.......D$0... @..W..D$8....f..D$......f..D$ f.D$..D$ f..D$0j..D$.......oD$.Pj..D$,.......D$0... @.j.W... @.h...........h.........
<<< skipped >>>
HEAD /revmontezuma3full HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:21 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14136&l=13262&n=1&filename=The Treasures of Montezuma 3
HEAD /DownloadManager/Get?p=1605&d=14124&l=13255&n=1&filename=Virtual Families HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 343
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:14 GMT
Location: hXXp://get.0140h.info/14487328940/14487328941/up3fn/gm8j/?09660624658Z1xuMTI5bjkrMSg1HV43MS4v=&Li4hZD0oLSw1LyRqNyweZmBmX=&25ba2E3UWFya29bbB8wLEBcZWljY19zIGd=faW&k1MycganJmOy0gXmduNCs=gdG07LS4vMDcqLDI5LiRjbjhfZWsxLA
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /14487329000/z78j/14487329004/o4yn613sv/?33091256576ZGJ0LjE=&9azcsLyoyI2Q0MDIsLS8fZjouMyk1LiFoOCog=&Y2ZsXG1=faF84O29vZGV&pJDArTWNoaiIvMCklZ15paTYtLS=NwaWs7L&CBeaGg6LiZrcjssLi8xMTAvOScvJGJu=OGBfcTQy HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 949
content-disposition: attachment;filename="Burger Shop 2.exe"
Content-Length: 347672
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:19 GMT
ETag: 7c843f65-3aba-462d-84ee-bc0ead0af265
Last-Modified: 11/28/2015 5:48:19 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /revvirtualvillagersfull HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:14 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14133&l=13259&n=1&filename=Virtual Villagers
HEAD /DownloadManager/Get?p=1605&d=14132&l=13258&n=1&filename=Slingo Quest HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 350
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:24 GMT
Location: hXXp://get.0140h.info/14487329040/14487329041/8duf7/14487329049/?11612384134ZmRu=NjA8aDk&wMyw0=JV48Lz&EpLzEjaDwwLTEzNR5qP=C4iZWhmZGxeZWE8UGhobWFuIy&8oTXRib3MlY2J=tazU&vLyNscWs3MCRgZ2=o8LiJzcjcwMjEwMzIvNS8zIGZyOl9hczQu
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /revmahjongfullversion HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:12 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=2401&l=2326&n=1&filename=Mahjong
HEAD /poUmYafxvA33FGKJn0BN-g/1448733189/7f1ce8045f21244e6bd7998439a32f83 HTTP/1.0
Host: 5659e8d9a3ee0.cleandl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 28 Nov 2015 17:48:10 GMT
Content-Type: application/octet-stream
Connection: close
Content-Length: 7680
Content-Disposition: attachment; filename="update.dat"
HEAD /aqjo7o6/14487328951/dxf3jn82fp/14487328959/?64275626174YWFyM=C&05bjcwLywvImI2LC4=vL&TIfaDctMSswMyRoPC=o&iYGVqXmlba188T2VscH=N&aZx8wKlViaGZdZV5tbS=RjY&mhqNy8uH2tsajcwH19pajs=qIW&5xNzAtMDIzMSszMzMgZm05YWFy=MC0 HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 832
content-disposition: attachment;filename="Virtual Villagers.exe"
Content-Length: 347672
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:14 GMT
ETag: 6a798dbf-63b9-438b-9137-b7a3da88aa43
Last-Modified: 11/28/2015 5:48:14 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /14487328940/14487328941/up3fn/gm8j/?09660624658Z1xuMTI5bjkrMSg1HV43MS4v=&Li4hZD0oLSw1LyRqNyweZmBmX=&25ba2E3UWFya29bbB8wLEBcZWljY19zIGd=faW&k1MycganJmOy0gXmduNCs=gdG07LS4vMDcqLDI5LiRjbjhfZWsxLA HTTP/1.0
Host: get.0140h.info
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 818
content-disposition: attachment;filename="Virtual Families.exe"
Content-Length: 347672
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:13 GMT
ETag: 423b8d6f-2de5-4d65-a7f1-589210b1debc
Last-Modified: 11/28/2015 5:48:13 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
GET /14487329060/14487329061/14487329064/e1wx/vs51c/144873290625/144873290636/144873290649/bo00d/?97140309952ZzYwMjAyJls0LTAvLzAibDoyKScwLx1nPC0mYnhcbG1qNGFzcHA3LyYsMTMwXjdhYl44WVoyLFplZF1uYWwlY2RsYihjLnVUVFxGYnhQaS9tRGdMW1h0XV9gLi00MTguKjEzJzAuNDcuNS5aL2ArXzMuMjNhKC8yLyovY15mYjMtXDAvXVolYHlrYWRgXmxYZmQ5U2xma25ccFwZSGpzcWFjYyFkYGVkamFqZTRqYHJsaQ HTTP/1.0
Host: get.file262desktop.info
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:28 GMT
Location: hXXp://get.0140h.info/14487329080/vtgxj/14487329084/elymu6zsj/?15188495067ZmBzLyo7ZzgxMCk0IWM1Ki4vMTEgZTwtMS=gtLR&1pPSsfZHNkbWpoNGN0bmk5Ki4tLjEwYDhfW2AzYVsvKlpnZVtnY2ctZGFqYipkLG5WT2RHX3ZQazBrPWlHY1lxW19iLy=stMzM2Ky4xJ&zIvMjAwMDZbLF4rYTQsKzVcMDAvLSoxZFxfZC=41XS0tXVwmXnJtXGxhW2pYaGU3TG5hc29ZblwbS&Whsc1xrZB5iYGdlaFpsYDxrXXBsayZjXG5pPCsoImdtbDcq=JV5uZjUtHW9zNyozLzcvKy4wKzggYHM4Zl1sMyk
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 513
Connection: Close
<html><head><title>Object moved</title></head><body>..<h2>Object moved to <a href="hXXp://get.0140h.info/14487329080/vtgxj/14487329084/elymu6zsj/?15188495067ZmBzLyo7ZzgxMCk0IWM1Ki4vMTEgZTwtMS=gtLR&1pPSsfZHNkbWpoNGN0bmk5Ki4tLjEwYDhfW2AzYVsvKlpnZVtnY2ctZGFqYipkLG5WT2RHX3ZQazBrPWlHY1lxW19iLy=stMzM2Ky4xJ&zIvMjAwMDZbLF4rYTQsKzVcMDAvLSoxZFxfZC=41XS0tXVwmXnJtXGxhW2pYaGU3TG5hc29ZblwbS&Whsc1xrZB5iYGdlaFpsYDxrXXBsayZjXG5pPCsoImdtbDcq=JV5uZjUtHW9zNyozLzcvKy4wKzggYHM4Zl1sMyk">here</a>.</h2>..</body></html>....
GET /ZGxwfGR8NDB8c29mdHdhcmV8NTJCNEYzfGRtcC5kYXQ HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:31 GMT
Content-Type: text/html
Connection: close
Set-Cookie: _pk_ses.40.2929=*; expires=Sat, 28-Nov-2015 18:18:31 GMT; path=/
Set-Cookie: _pk_id.40.2929=d8fad8ce60cef2e1.1448732911.1.1448732911..; expires=Mon, 27-Nov-2017 17:48:31 GMT; path=/
Set-Cookie: _pk_cvar.40.2929=false; expires=Sat, 28-Nov-2015 18:18:31 GMT; path=/
LOCATION: hXXp://5659e8efefb97.cleandl.link/thGDQ-vCUEoMRVpt7U0c9Q/1448733211/d5b6db43cddb2e86269ca59134f0cd26
HEAD /14487328990/t21fplm849/14487328994/14487328999/?46200228249Y19yNzI9bjUvMicxIGI9MjA2Li8i=YzksMDA1LyRmOy0dYXJjdXJqO2B&ycGchLV8lMmQjKmRhWG9zd291cnNaY2Bmc2hqb2FiY2osYGMqYHBlZWB3bGN2JW=&pf=ciUyZGFmY3BWb19ydXAsY3BjIlt1aF9taW&FsWWthNEFbcXklMC5RbXFrcVxjJTIuQmd1amNrW2JlciRkYWphZV1nYz1zY3JtbiJgX2lsPTMuJGhwaDQtIGFv=bjsvHnJvNC0uMjg3MTAwNzUdY247Z2VyNSo HTTP/1.0
Host: get.0140h.info
Cookie: _pk_ses.40.1840=*; _pk_id.40.1840=f614868d881cfa7a.1448732897.1.1448732897..; _pk_cvar.40.1840=false
User-Agent: InnoTools_Downloader
HTTP/1.1 200 OK
Cache-Control: max - age = 826
content-disposition: attachment;filename="setup.exe"
Content-Length: 347768
Content-Type: application/octet-stream
Date: Sat, 28 Nov 2015 17:48:17 GMT
ETag: 5c3786ba-b0bb-413f-8a07-4790c94cc8d1
Last-Modified: 11/28/2015 5:48:18 PM
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /14487328860/14487328861/14487328864/?00284073473cD0vLiw1H2E5Ky84Ni8eaD0rLywuLiZuOykiZXFicWtpPWhybGw6KCwxLzI5ZTZcMzZdYDAuK2NsY1lqZGUraGJray9NQEE0X2JeJktWVGg9ZGNfNlY8Plh3LSkwNDE0Ly8xODctLS8yLTFfX2BkYmIuLjJcYDEsM2E0LiovMzJeYlw0MzUkXHVuWmplXGthbWM1T29fcXNab2UgR2ZvdFppaB9jaWxjZl1tXjpvXnF1cA HTTP/1.0
Host: get.file262desktop.info
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 551
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:08 GMT
Location: hXXp://get.0140h.info/14487328890/14487328891/14487328894/14487328899/?14361269096ZmFxMTE9ajQxLSo0Im=E3MT&AyLTEdZjwuLyo0LyBlPSggZHRib3FqN19=&=0a2o5KywvNTMzXDhbMTVg&YC40LF1jZVho=Y2grZmhsZSZPPz8zYmJcL&ExQS2o8YmJiNlRCP1JuLyguMzQ0LTUyMi4vLC0xMD=Fd&ZWFeWWQtLDFfYC8yNFsrMCktMjVeYGI1LS=wmW&3NtXWpjYmxbZGU0TW5icXFg=cF8XSWVtc11pZiV&kY2NlZVtsYTptZHJvZyZ=gXW5q&Oi0=vJGppbDQrJV9saDwvIGtzNCszMDUxMjAyLzkdYXM5ZF9zNSw
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /cmV2fGR8MHxzb2Z0d2FyZXw1MkI0RjN8c2V0dXAuZXhl HTTP/1.0
Host: mjaxns0xms0yocaxos40oc4xma.securefiledl.link
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:07 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file262desktop.info/14487328860/14487328861/14487328864/?00284073473cD0vLiw1H2E5Ky84Ni8eaD0rLywuLiZuOykiZXFicWtpPWhybGw6KCwxLzI5ZTZcMzZdYDAuK2NsY1lqZGUraGJray9NQEE0X2JeJktWVGg9ZGNfNlY8Plh3LSkwNDE0Ly8xODctLS8yLTFfX2BkYmIuLjJcYDEsM2E0LiovMzJeYlw0MzUkXHVuWmplXGthbWM1T29fcXNab2UgR2ZvdFppaB9jaWxjZl1tXjpvXnF1cA
HEAD /DownloadManager/Get?p=1605&d=2402&l=2327&n=1&filename=JewelQuest HTTP/1.0
Host: get.file20desktop.com
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 345
Content-Type: text/html; charset=utf-8
Date: Sat, 28 Nov 2015 17:48:16 GMT
Location: hXXp://get.0140h.info/gl9kfevd/14487328961/14487328964/14487328969/?29980619789ZVxrLzI5bzQqLic=&zHVs1Mi4vKR9kNDAqKS8=&maDwoH15galxlWW1fPEF=eb&1xqSGxdc24lYFxnZTsqJx5wbGs0Kh5abWU=0K&SZucjQqLCs2LioqODM1HWBsNG=Vcay8y
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Connection: Close
HEAD /revsherlockholmes2full HTTP/1.0
Host: jmp2.in
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:22 GMT
Content-Type: text/html
Connection: close
LOCATION: hXXp://get.file20desktop.com/DownloadManager/Get?p=1605&d=14131&l=13257&n=1&filename=The Lost Cases of Sherlock Holmes 2
HEAD /setup.exe HTTP/1.0
Host: easyyoutubedownloader.dl.freebytez.net
User-Agent: InnoTools_Downloader
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Sat, 28 Nov 2015 17:48:18 GMT
Content-Type: text/html
Connection: close
Set-Cookie: _pk_ses.40.1840=*; expires=Sat, 28-Nov-2015 18:18:17 GMT; path=/
Set-Cookie: _pk_id.40.1840=f614868d881cfa7a.1448732897.1.1448732897..; expires=Mon, 27-Nov-2017 17:48:17 GMT; path=/
Set-Cookie: _pk_cvar.40.1840=false; expires=Sat, 28-Nov-2015 18:18:17 GMT; path=/
LOCATION: hXXp://get.FILE155DESKTOPSCR.INFO/downloadmanager/get?p=1605&d=22861&l=22051&n=1&exeurl=hXXp://easyyoutubedownloader.dl.freebytez.net/cnet_setup.exe&dynamicname=Easy Youtube Downloader&filename=setup
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
jew.exe_1412:
.text
.text
`.itext
`.itext
`.data
`.data
.idata
.idata
.rdata
.rdata
@.rsrc
@.rsrc
ENoMonitorSupportException
ENoMonitorSupportException
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
oleaut32.dll
advapi32.dll
advapi32.dll
RegOpenKeyExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
user32.dll
user32.dll
GetKeyboardType
GetKeyboardType
kernel32.dll
kernel32.dll
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
ExitWindowsEx
ExitWindowsEx
GetWindowsDirectoryW
GetWindowsDirectoryW
GetCPInfo
GetCPInfo
comctl32.dll
comctl32.dll
KWindows
KWindows
6MsgIDs
6MsgIDs
Msgs
Msgs
name="JR.Inno.Setup"
name="JR.Inno.Setup"
version="1.0.0.0"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
publicKeyToken="6595b64144ccf1df"
true
true
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
File I/O error %d
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
lzmadecompsmall: %s
LzmaDecode failed (%d)
LzmaDecode failed (%d)
/SUPPRESSMSGBOXES
/SUPPRESSMSGBOXES
/PASSWORD=password
/PASSWORD=password
Specifies the password to use.
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
shell32.dll
shell32.dll
/SL5="$%x,%d,%d,
/SL5="$%x,%d,%d,
Invalid file name - %s
Invalid file name - %s
Invalid variant operation
Invalid variant operation
External exception %x
External exception %x
Interface not supported
Interface not supported
Object lock not owned(Monitor support function not initialized
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
No argument for format '%s'"Variant method calls not supported
I/O error %d
I/O error %d
Integer overflow Invalid floating point operation
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid pointer operation
iCloud Activation Lock Bypass Tool
iCloud Activation Lock Bypass Tool
jew.tmp_228:
.text
.text
`.itext
`.itext
`.data
`.data
.idata
.idata
.rdata
.rdata
@.rsrc
@.rsrc
Windows
Windows
ENoMonitorSupportException
ENoMonitorSupportException
.uvCOu
.uvCOu
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
EVariantBadIndexError
EVariantBadIndexError
Uh.pA
Uh.pA
ssShift
ssShift
htKeyword
htKeyword
EInvalidOperation
EInvalidOperation
EInvalidGraphicOperation
EInvalidGraphicOperation
Uh.IC
Uh.IC
Uh.kC
Uh.kC
PasswordChar
PasswordChar
OnKeyDown
OnKeyDown
OnKeyPressdPE
OnKeyPressdPE
OnKeyUp
OnKeyUp
ssHorizontal
ssHorizontal
OnKeyUph
OnKeyUph
TCustomButton.TButtonStyle
TCustomButton.TButtonStyle
AutoHotkeys
AutoHotkeys
TKeyEvent
TKeyEvent
TKeyPressEvent
TKeyPressEvent
HelpKeywordH
HelpKeywordH
ssHotTrack
ssHotTrack
TWindowState
TWindowState
poProportional
poProportional
TWMKey
TWMKey
KeyPreview,NE
KeyPreview,NE
WindowState
WindowState
EXPORT
EXPORT
TPSExec
TPSExec
TPSRuntimeClassImporterPkP
TPSRuntimeClassImporterPkP
TPSExportedVar
TPSExportedVar
TPSCustomDebugExec
TPSCustomDebugExec
TPSDebugExec
TPSDebugExec
t.Htb
t.Htb
1.2.1
1.2.1
TPasswordEdit
TPasswordEdit
TPasswordEditt
TPasswordEditt
PasswordEdit(
PasswordEdit(
Password
Password
PasswordPage
PasswordPage
PasswordLabel
PasswordLabel
PasswordEdit
PasswordEdit
PasswordEditLabel
PasswordEditLabel
CheckPassword
CheckPassword
IMsg
IMsg
FormKeyDown
FormKeyDown
PasswordCheckHash
PasswordCheckHash
TKeyNameConst
TKeyNameConst
TOutputMsgWizardPage
TOutputMsgWizardPage
TOutputMsgWizardPageXiN
TOutputMsgWizardPageXiN
TOutputMsgMemoWizardPage
TOutputMsgMemoWizardPage
TOutputMsgMemoWizardPage
TOutputMsgMemoWizardPage
MsgLabel
MsgLabel
Msg1Label
Msg1Label
Msg2Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
MSGBOX
INIKEYEXISTS
INIKEYEXISTS
GETCMDTAIL
GETCMDTAIL
REGKEYEXISTS
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
REGGETSUBKEYNAMES
CHECKFORMUTEXES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXEC
SHELLEXECASORIGINALUSER
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
Uh.EO
Uh.EO
EXITSETUPMSGBOX
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
GETWINDOWSVERSIONSTRING
SUPPRESSIBLEMSGBOX
SUPPRESSIBLEMSGBOX
GetWindowsVersionEx
GetWindowsVersionEx
IMsgt
IMsgt
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
oleaut32.dll
advapi32.dll
advapi32.dll
RegOpenKeyExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
user32.dll
user32.dll
GetKeyboardType
GetKeyboardType
kernel32.dll
kernel32.dll
UnhookWindowsHookEx
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowsHookExW
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
MapVirtualKeyW
MapVirtualKeyW
LoadKeyboardLayoutW
LoadKeyboardLayoutW
GetKeyboardState
GetKeyboardState
GetKeyboardLayoutNameW
GetKeyboardLayoutNameW
GetKeyboardLayoutList
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyboardLayout
GetKeyState
GetKeyState
GetKeyNameTextW
GetKeyNameTextW
ExitWindowsEx
ExitWindowsEx
EnumWindows
EnumWindows
EnumThreadWindows
EnumThreadWindows
EnumChildWindows
EnumChildWindows
ActivateKeyboardLayout
ActivateKeyboardLayout
msimg32.dll
msimg32.dll
gdi32.dll
gdi32.dll
SetViewportOrgEx
SetViewportOrgEx
version.dll
version.dll
mpr.dll
mpr.dll
TransactNamedPipe
TransactNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
GetWindowsDirectoryW
GetWindowsDirectoryW
GetCPInfo
GetCPInfo
CreateNamedPipeW
CreateNamedPipeW
RegQueryInfoKeyW
RegQueryInfoKeyW
RegFlushKey
RegFlushKey
RegEnumKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyExW
comctl32.dll
comctl32.dll
ole32.dll
ole32.dll
shell32.dll
shell32.dll
ShellExecuteExW
ShellExecuteExW
ShellExecuteW
ShellExecuteW
comdlg32.dll
comdlg32.dll
`.rdata
`.rdata
@.data
@.data
.pdata
.pdata
COMCTL32.dll
COMCTL32.dll
SHLWAPI.dll
SHLWAPI.dll
SetProcessShutdownParameters
SetProcessShutdownParameters
KERNEL32.dll
KERNEL32.dll
ADVAPI32.dll
ADVAPI32.dll
SHELL32.dll
SHELL32.dll
OLEAUT32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
publicKeyToken="6595b64144ccf1df"
KWindows
KWindows
6MsgIDs
6MsgIDs
Msgs
Msgs
UrlMon
UrlMon
.rsrc
.rsrc
@.reloc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
shlwapi.dll
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
RegKey
GetWindowsDirectoryA
GetWindowsDirectoryA
RegOpenKeyA
RegOpenKeyA
RegCreateKeyExA
RegCreateKeyExA
SHFOLDER.dll
SHFOLDER.dll
dll\shfolder.dbg
dll\shfolder.dbg
Font.Color
Font.Color
Font.Height
Font.Height
Font.Name
Font.Name
Font.Style
Font.Style
Lines.Strings
Lines.Strings
name="JR.Inno.Setup"
name="JR.Inno.Setup"
version="1.0.0.0"
version="1.0.0.0"
true
true
MSWHEEL_ROLLMSG
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
MSH_SCROLL_LINES_MSG
%s_%d
%s_%d
USER32.DLL
USER32.DLL
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
uxtheme.dll
uxtheme.dll
DWMAPI.DLL
DWMAPI.DLL
clWebSnow
clWebSnow
clWebFloralWhite
clWebFloralWhite
clWebLavenderBlush
clWebLavenderBlush
clWebOldLace
clWebOldLace
clWebIvory
clWebIvory
clWebCornSilk
clWebCornSilk
clWebBeige
clWebBeige
clWebAntiqueWhite
clWebAntiqueWhite
clWebWheat
clWebWheat
clWebAliceBlue
clWebAliceBlue
clWebGhostWhite
clWebGhostWhite
clWebLavender
clWebLavender
clWebSeashell
clWebSeashell
clWebLightYellow
clWebLightYellow
clWebPapayaWhip
clWebPapayaWhip
clWebNavajoWhite
clWebNavajoWhite
clWebMoccasin
clWebMoccasin
clWebBurlywood
clWebBurlywood
clWebAzure
clWebAzure
clWebMintcream
clWebMintcream
clWebHoneydew
clWebHoneydew
clWebLinen
clWebLinen
clWebLemonChiffon
clWebLemonChiffon
clWebBlanchedAlmond
clWebBlanchedAlmond
clWebBisque
clWebBisque
clWebPeachPuff
clWebPeachPuff
clWebTan
clWebTan
clWebYellow
clWebYellow
clWebDarkOrange
clWebDarkOrange
clWebRed
clWebRed
clWebDarkRed
clWebDarkRed
clWebMaroon
clWebMaroon
clWebIndianRed
clWebIndianRed
clWebSalmon
clWebSalmon
clWebCoral
clWebCoral
clWebGold
clWebGold
clWebTomato
clWebTomato
clWebCrimson
clWebCrimson
clWebBrown
clWebBrown
clWebChocolate
clWebChocolate
clWebSandyBrown
clWebSandyBrown
clWebLightSalmon
clWebLightSalmon
clWebLightCoral
clWebLightCoral
clWebOrange
clWebOrange
clWebOrangeRed
clWebOrangeRed
clWebFirebrick
clWebFirebrick
clWebSaddleBrown
clWebSaddleBrown
clWebSienna
clWebSienna
clWebPeru
clWebPeru
clWebDarkSalmon
clWebDarkSalmon
clWebRosyBrown
clWebRosyBrown
clWebPaleGoldenrod
clWebPaleGoldenrod
clWebLightGoldenrodYellow
clWebLightGoldenrodYellow
clWebOlive
clWebOlive
clWebForestGreen
clWebForestGreen
clWebGreenYellow
clWebGreenYellow
clWebChartreuse
clWebChartreuse
clWebLightGreen
clWebLightGreen
clWebAquamarine
clWebAquamarine
clWebSeaGreen
clWebSeaGreen
clWebGoldenRod
clWebGoldenRod
clWebKhaki
clWebKhaki
clWebOliveDrab
clWebOliveDrab
clWebGreen
clWebGreen
clWebYellowGreen
clWebYellowGreen
clWebLawnGreen
clWebLawnGreen
clWebPaleGreen
clWebPaleGreen
clWebMediumAquamarine
clWebMediumAquamarine
clWebMediumSeaGreen
clWebMediumSeaGreen
clWebDarkGoldenRod
clWebDarkGoldenRod
clWebDarkKhaki
clWebDarkKhaki
clWebDarkOliveGreen
clWebDarkOliveGreen
clWebDarkgreen
clWebDarkgreen
clWebLimeGreen
clWebLimeGreen
clWebLime
clWebLime
clWebSpringGreen
clWebSpringGreen
clWebMediumSpringGreen
clWebMediumSpringGreen
clWebDarkSeaGreen
clWebDarkSeaGreen
clWebLightSeaGreen
clWebLightSeaGreen
clWebPaleTurquoise
clWebPaleTurquoise
clWebLightCyan
clWebLightCyan
clWebLightBlue
clWebLightBlue
clWebLightSkyBlue
clWebLightSkyBlue
clWebCornFlowerBlue
clWebCornFlowerBlue
clWebDarkBlue
clWebDarkBlue
clWebIndigo
clWebIndigo
clWebMediumTurquoise
clWebMediumTurquoise
clWebTurquoise
clWebTurquoise
clWebCyan
clWebCyan
clWebPowderBlue
clWebPowderBlue
clWebSkyBlue
clWebSkyBlue
clWebRoyalBlue
clWebRoyalBlue
clWebMediumBlue
clWebMediumBlue
clWebMidnightBlue
clWebMidnightBlue
clWebDarkTurquoise
clWebDarkTurquoise
clWebCadetBlue
clWebCadetBlue
clWebDarkCyan
clWebDarkCyan
clWebTeal
clWebTeal
clWebDeepskyBlue
clWebDeepskyBlue
clWebDodgerBlue
clWebDodgerBlue
clWebBlue
clWebBlue
clWebNavy
clWebNavy
clWebDarkViolet
clWebDarkViolet
clWebDarkOrchid
clWebDarkOrchid
clWebMagenta
clWebMagenta
clWebDarkMagenta
clWebDarkMagenta
clWebMediumVioletRed
clWebMediumVioletRed
clWebPaleVioletRed
clWebPaleVioletRed
clWebBlueViolet
clWebBlueViolet
clWebMediumOrchid
clWebMediumOrchid
clWebMediumPurple
clWebMediumPurple
clWebPurple
clWebPurple
clWebDeepPink
clWebDeepPink
clWebLightPink
clWebLightPink
clWebViolet
clWebViolet
clWebOrchid
clWebOrchid
clWebPlum
clWebPlum
clWebThistle
clWebThistle
clWebHotPink
clWebHotPink
clWebPink
clWebPink
clWebLightSteelBlue
clWebLightSteelBlue
clWebMediumSlateBlue
clWebMediumSlateBlue
clWebLightSlateGray
clWebLightSlateGray
clWebWhite
clWebWhite
clWebLightgrey
clWebLightgrey
clWebGray
clWebGray
clWebSteelBlue
clWebSteelBlue
clWebSlateBlue
clWebSlateBlue
clWebSlateGray
clWebSlateGray
clWebWhiteSmoke
clWebWhiteSmoke
clWebSilver
clWebSilver
clWebDimGray
clWebDimGray
clWebMistyRose
clWebMistyRose
clWebDarkSlateBlue
clWebDarkSlateBlue
clWebDarkSlategray
clWebDarkSlategray
clWebGainsboro
clWebGainsboro
clWebDarkGray
clWebDarkGray
clWebBlack
clWebBlack
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
crSQLWait
crSQLWait
%s (%s)
%s (%s)
imm32.dll
imm32.dll
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
RegDeleteKeyExW
RegDeleteKeyExW
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
%s, ClassID: %s
%s, ClassID: %s
%s, ProgID: "%s"
%s, ProgID: "%s"
oleacc.dll
oleacc.dll
MSFTEDIT.DLL
MSFTEDIT.DLL
RICHED20.DLL
RICHED20.DLL
Rstrtmgr.dll
Rstrtmgr.dll
File I/O error %d
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
HKEY_CLASSES_ROOT
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
HKEY_DYN_DATA
WININIT.INI
WININIT.INI
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegCreateKeyEx
RegOpenKeyEx
RegOpenKeyEx
sfc.dll
sfc.dll
cmd.exe" /C "
cmd.exe" /C "
COMMAND.COM" /C
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations
PendingFileRenameOperations2
PendingFileRenameOperations2
@Software\Microsoft\Windows\CurrentVersion\Fonts
@Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
OLEAUT32.DLL
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
%s Log %s #%.3u.txt
regsvr32.exe"
regsvr32.exe"
Cannot register 64-bit DLLs on this version of Windows
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
CreateNamedPipe
helper %d 0x%x
helper %d 0x%x
Helper process PID: %u
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
Helper process exited with failure code: 0x%x
TransactNamedPipe/GetOverlappedResult
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
v1.1.4322
.NET Framework version %s not found
.NET Framework version %s not found
Fusion.dll
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
MoveFileEx failed (%d).
Deleting directory: %s
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Failed to delete directory (%d).
Deleting file: %s
Deleting file: %s
Failed to delete the file; it may be in use (%d).
Failed to delete the file; it may be in use (%d).
The file appears to be in use (%d). Will delete on restart.
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec filename:
Running Exec parameters:
Running Exec parameters:
CreateProcess failed (%d).
CreateProcess failed (%d).
Process exit code: %u
Process exit code: %u
Running ShellExec filename:
Running ShellExec filename:
Running ShellExec parameters:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
Unregistering font: %s
zlib: Internal error. Code %d
zlib: Internal error. Code %d
bzlib: Internal error. Code %d
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
DecodeToBuf failed (%d)
c:\directory
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Could not find page with ID %d
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
%s\%s_is1
RestartManager found an application using one of our files: %s
RestartManager found an application using one of our files: %s
Can use RestartManager to avoid reboot? %s (%d)
Can use RestartManager to avoid reboot? %s (%d)
PrepareToInstall failed: %s
PrepareToInstall failed: %s
Need to restart Windows? %s
Need to restart Windows? %s
/:*?"|
/:*?"|
\/:*?"|
\/:*?"|
%s-%d.bin
%s-%d.bin
%s-%d%s.bin
%s-%d%s.bin
..\DISK%d\
..\DISK%d\
Asking user for new disk containing "%s".
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows\CurrentVersion\Uninstall\
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.5.5 (u)
5.5.5 (u)
URLInfoAbout
URLInfoAbout
URLUpdateInfo
URLUpdateInfo
Creating directory: %s
Creating directory: %s
Setting permissions on directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
Failed to set NTFS compression state (%d).
Failed to set value in Fonts registry key.
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Setting permissions on file: %s
Failed to set permissions on file (%d).
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of our file: %s
Time stamp of existing file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
Cannot install files to 64-bit locations on this version of Windows
desktop.ini
desktop.ini
.ShellClassInfo
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}
{0AFACED1-E828-11D1-9187-B532F1E9575D}
target.lnk
target.lnk
Desktop.ini
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Software\Microsoft\Windows\CurrentVersion\App Paths\
Section: %s
Section: %s
Entry: %s
Entry: %s
Value: %s
Value: %s
Updating the .INI file.
Updating the .INI file.
Successfully updated the .INI file.
Successfully updated the .INI file.
Skipping updating the .INI file, only updating uninstall log.
Skipping updating the .INI file, only updating uninstall log.
Setting permissions on registry key: %s\%s
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
LoggedMsgBox returned an unexpected value. Assuming Cancel.
RmShutdown returned an error: %d
RmShutdown returned an error: %d
Fatal exception during installation process (%s):
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFiles: No files matching "%s" found
ExtractTemporaryFiles: No files matching "%s" found
Invalid symbol '%s' found
Invalid symbol '%s' found
Invalid token '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx
ShellExecuteEx returned hProcess=0
ShellExecuteEx returned hProcess=0
Wnd=$%x
Wnd=$%x
Expression error '%s'
Expression error '%s'
SuppressMsgBoxes
SuppressMsgBoxes
srcexe
srcexe
Cannot evaluate "%s" constant during Uninstall
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
Unknown custom message name "%s" in "cm" constant
Cannot expand "pf64" constant on this version of Windows
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
cmd.exe
COMMAND.COM
COMMAND.COM
\_setup64.tmp
\_setup64.tmp
_isetup\_shfoldr.dll
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
shfolder.dll
Failed to load DLL "%s"
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
64-bit Windows: %s
Processor architecture: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Defaulting to %s for suppressed message box (%s):
Message box (%s):
Message box (%s):
User chose %s.
User chose %s.
MsgBox failed.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
64-bit install mode: %s
_isetup\_isdecmp.dll
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
_isetup\_iscrypt.dll
/Password=
/Password=
/SuppressMsgBoxes
/SuppressMsgBoxes
/DETACHEDMSG
/DETACHEDMSG
-0.bin
-0.bin
Setup version: Inno Setup version 5.5.5 (u)
Setup version: Inno Setup version 5.5.5 (u)
Original Setup EXE:
Original Setup EXE:
Not restarting Windows because Setup is being run from the debugger.
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Restarting Windows.
Inno Setup version 5.5.5 (u)
Inno Setup version 5.5.5 (u)
Portions Copyright (C) 2000-2014 Martijn Laan
Portions Copyright (C) 2000-2014 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: Exec
Type: ShellExec
Type: ShellExec
RmRestart returned an error: %d
RmRestart returned an error: %d
Need to restart Windows, not attempting to restart applications
Need to restart Windows, not attempting to restart applications
Will not restart Windows automatically.
Will not restart Windows automatically.
RegDeleteKeyExA
RegDeleteKeyExA
System\CurrentControlSet\Control\Windows
System\CurrentControlSet\Control\Windows
Cannot call "%s" function during Setup
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Cannot call "%s" function during Uninstall
Invalid RootKey value
Invalid RootKey value
Unknown custom message name "%s"
Unknown custom message name "%s"
%u.%.2u.%u
%u.%.2u.%u
%u.%u.%u.%u
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
Cannot disable FS redirection on this version of Windows
Runtime Error (at %d:%d):
Runtime Error (at %d:%d):
Exception "%s" at address %p
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
Not restarting Windows because Uninstall is being run from the debugger.
isRS-???.tmp
isRS-???.tmp
isRS-%.3u.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
DisableProcessWindowsGhosting
Interface not supported
Interface not supported
7Dispatch methods do not support more than 64 parameters
7Dispatch methods do not support more than 64 parameters
Exception: %s
Exception: %s
Cannot Import %s
Cannot Import %s
Unable to insert a line Clipboard does not support Icons
Unable to insert a line Clipboard does not support Icons
Text exceeds memo capacity/Menu '%s' is already being used by another form
Text exceeds memo capacity/Menu '%s' is already being used by another form
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
Error setting %s.Count8Listbox (%s) style must be virtual in order to set Count
Error setting %s.Count8Listbox (%s) style must be virtual in order to set Count
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'
No help found for %s
No help found for %s
Unsupported clipboard format
Unsupported clipboard format
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Property %s does not exist
Thread creation error: %s
Thread creation error: %s
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread$No help viewer that supports filters#''%s'' is not a valid integer value
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread$No help viewer that supports filters#''%s'' is not a valid integer value
Cannot open file "%s". %s
Cannot open file "%s". %s
Invalid file name - %s
Invalid file name - %s
Invalid stream format$''%s'' is not a valid component name
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Error reading %s%s%s: %s
Failed to get data for '%s'
Failed to get data for '%s'
Resource %s not found"Character index out of bounds (%d)
Resource %s not found"Character index out of bounds (%d)
Start index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid count (%d)
Invalid destination index (%d)
Invalid destination index (%d)
Ancestor for '%s' not found
Ancestor for '%s' not found
Cannot assign a %s to a %s
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot create file "%s". %s
Object lock not owned(Monitor support function not initialized
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
System Error. Code: %d.
Invalid variant operation
Invalid variant operation
Invalid NULL variant operation%Invalid variant operation (%s%.8x)
Invalid NULL variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
Operation not supported
External exception %x
External exception %x
Invalid pointer operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
No argument for format '%s'"Variant method calls not supported
I/O error %d
I/O error %d
Integer overflow Invalid floating point operation
Integer overflow Invalid floating point operation
n%USERPROFILE%
n%USERPROFILE%
r%SYSTEMROOT%
r%SYSTEMROOT%
5.50.4807.2300
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
Datos de programa%Configuraci
51.1052.0.0
51.1052.0.0
%original file name%.exe_1016:
.text
.text
`.reloc
`.reloc
B.rsrc
B.rsrc
/.ffefefeeffe
/.ffefefeeffe
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
sÞUK
sÞUK
v2.0.50727
v2.0.50727
NanoCore Client.exe
NanoCore Client.exe
Microsoft.VisualBasic
Microsoft.VisualBasic
System.Windows.Forms
System.Windows.Forms
System.Drawing
System.Drawing
kernel32.dll
kernel32.dll
psapi.dll
psapi.dll
advapi32.dll
advapi32.dll
ntdll.dll
ntdll.dll
dnsapi.dll
dnsapi.dll
ClientLoaderForm.resources
ClientLoaderForm.resources
Microsoft.VisualBasic.ApplicationServices
Microsoft.VisualBasic.ApplicationServices
Microsoft.VisualBasic.CompilerServices
Microsoft.VisualBasic.CompilerServices
Operators
Operators
Microsoft.VisualBasic.Devices
Microsoft.VisualBasic.Devices
Microsoft.Win32
Microsoft.Win32
RegistryKey
RegistryKey
NanoCore.ClientPlugin
NanoCore.ClientPlugin
NanoCore.ClientPluginHost
NanoCore.ClientPluginHost
System.CodeDom.Compiler
System.CodeDom.Compiler
System.Collections.Generic
System.Collections.Generic
KeyValuePair`2
KeyValuePair`2
System.Collections
System.Collections
System.ComponentModel
System.ComponentModel
System.Diagnostics
System.Diagnostics
ProcessWindowStyle
ProcessWindowStyle
InvalidOperationException
InvalidOperationException
System.IO
System.IO
System.IO.Compression
System.IO.Compression
System.Net
System.Net
System.Net.Sockets
System.Net.Sockets
SocketAsyncOperation
SocketAsyncOperation
OperatingSystem
OperatingSystem
System.Reflection
System.Reflection
System.Runtime.CompilerServices
System.Runtime.CompilerServices
System.Runtime.InteropServices
System.Runtime.InteropServices
System.Security.AccessControl
System.Security.AccessControl
System.Security.Cryptography
System.Security.Cryptography
System.Security.Principal
System.Security.Principal
WindowsBuiltInRole
WindowsBuiltInRole
WindowsIdentity
WindowsIdentity
WindowsPrincipal
WindowsPrincipal
System.Text
System.Text
System.Threading
System.Threading
FormWindowState
FormWindowState
#=qmLTtz8OEDrkzFTzYkI_Dg1dvKwiGw9blNcZSU_QqMsg=
#=qmLTtz8OEDrkzFTzYkI_Dg1dvKwiGw9blNcZSU_QqMsg=
.cctor
.cctor
.ctor
.ctor
ClosePipe
ClosePipe
PipeExists
PipeExists
#=qNn8WS2rooUJUoMsG84mQ7PkK4IQF8$E42cyDjfL7Kqc=
#=qNn8WS2rooUJUoMsG84mQ7PkK4IQF8$E42cyDjfL7Kqc=
#=qwSqLSPEuM8lJy4sOeuH92YjPodcLquqdG$OodozwC60=
#=qwSqLSPEuM8lJy4sOeuH92YjPodcLquqdG$OodozwC60=
#=qiY1B9yU2oVkPHxhn$y67SFTP8x1Jb0botGqdUGkdpQg=
#=qiY1B9yU2oVkPHxhn$y67SFTP8x1Jb0botGqdUGkdpQg=
CreatePipe
CreatePipe
PipeCreated
PipeCreated
#=q85afbI_HcqBFOZnC0iAqsNghLb3LsuyjFtpLEYYoPX8=
#=q85afbI_HcqBFOZnC0iAqsNghLb3LsuyjFtpLEYYoPX8=
#=q$fGRvwQxjFKeY$SH10p0pyPTU$R77VMKr3CcLFQeQ2Y=
#=q$fGRvwQxjFKeY$SH10p0pyPTU$R77VMKr3CcLFQeQ2Y=
#=q6wR5WMLGkL9afTpqmWsw9g==
#=q6wR5WMLGkL9afTpqmWsw9g==
SetThreadExecutionState
SetThreadExecutionState
RegOpenKeyEx
RegOpenKeyEx
RegCloseKey
RegCloseKey
ContainsKey
ContainsKey
PipeClosed
PipeClosed
get_Key
get_Key
GetExecutingAssembly
GetExecutingAssembly
set_Key
set_Key
get_ExecutablePath
get_ExecutablePath
OpenSubKey
OpenSubKey
set_UseShellExecute
set_UseShellExecute
set_WindowStyle
set_WindowStyle
GetPublicKeyToken
GetPublicKeyToken
get_Port
get_Port
get_LastOperation
get_LastOperation
set_WindowState
set_WindowState
8.0.0.0
8.0.0.0
System.Windows.Forms.Form
System.Windows.Forms.Form
My.MyProject.Forms
My.MyProject.Forms
4System.Web.Services.Protocols.SoapHttpClientProtocol
4System.Web.Services.Protocols.SoapHttpClientProtocol
$3983653b-cb38-49f2-8acb-9d272a46ef2f
$3983653b-cb38-49f2-8acb-9d272a46ef2f
1.2.2.0
1.2.2.0
_CorExeMain
_CorExeMain
mscoree.dll
mscoree.dll
KlSSh
KlSSh
YQ\û
YQ\û
.pesz
.pesz
.lx,E
.lx,E
.Wtua
.Wtua
iÄ%5
iÄ%5
x.oN.v]
x.oN.v]
f.xd!>
f.xd!>
&%U(J
&%U(J
:):9.Oc
:):9.Oc
.FF[Z
.FF[Z
'_~.nr%
'_~.nr%
~e.Xq
~e.Xq
Y%.cY|
Y%.cY|
.zR&'}
.zR&'}
dM.dC
dM.dC
z.Khv
z.Khv
HYuRL
HYuRL
H.ikk,
H.ikk,
7.SJ0
7.SJ0
A.VE
A.VE
-L4}lz
-L4}lz
G%sG}
G%sG}
?-w}VA
?-w}VA
hT.sie
hT.sie
I.hz"
I.hz"
v%S#U
v%S#U
@`%FIf
@`%FIf
P}.WN
P}.WN
(j`!%C
(j`!%C
C%sId
C%sId
j?kÃ
j?kÃ
.Ee;=
.Ee;=
m%7xI:
m%7xI:
j#a.xb`
j#a.xb`
=79%s
=79%s
.fbN[U
.fbN[U
^;%U1
^;%U1
xdR%F
xdR%F
%Upe_
%Upe_
TX%9u=
TX%9u=
.pwg>v
.pwg>v
([%c?
([%c?
%F\6i&
%F\6i&
2.VrIs
2.VrIs
=JORkcRt
=JORkcRt
_*.MR
_*.MR
9[1%X
9[1%X
uR%F'
uR%F'
m;%XX|
m;%XX|
[M\E`h.MNo
[M\E`h.MNo
jew.tmp_228_rwx_01BC6000_00001000:
Invalid variant operation
Invalid variant operation
Invalid pointer operation
Invalid pointer operation
%original file name%.exe_1016_rwx_00400000_00092000:
.text
.text
`.reloc
`.reloc
B.rsrc
B.rsrc
/.ffefefeeffe
/.ffefefeeffe
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
sÞUK
sÞUK
v2.0.50727
v2.0.50727
NanoCore Client.exe
NanoCore Client.exe
Microsoft.VisualBasic
Microsoft.VisualBasic
System.Windows.Forms
System.Windows.Forms
System.Drawing
System.Drawing
kernel32.dll
kernel32.dll
psapi.dll
psapi.dll
advapi32.dll
advapi32.dll
ntdll.dll
ntdll.dll
dnsapi.dll
dnsapi.dll
ClientLoaderForm.resources
ClientLoaderForm.resources
Microsoft.VisualBasic.ApplicationServices
Microsoft.VisualBasic.ApplicationServices
Microsoft.VisualBasic.CompilerServices
Microsoft.VisualBasic.CompilerServices
Operators
Operators
Microsoft.VisualBasic.Devices
Microsoft.VisualBasic.Devices
Microsoft.Win32
Microsoft.Win32
RegistryKey
RegistryKey
NanoCore.ClientPlugin
NanoCore.ClientPlugin
NanoCore.ClientPluginHost
NanoCore.ClientPluginHost
System.CodeDom.Compiler
System.CodeDom.Compiler
System.Collections.Generic
System.Collections.Generic
KeyValuePair`2
KeyValuePair`2
System.Collections
System.Collections
System.ComponentModel
System.ComponentModel
System.Diagnostics
System.Diagnostics
ProcessWindowStyle
ProcessWindowStyle
InvalidOperationException
InvalidOperationException
System.IO
System.IO
System.IO.Compression
System.IO.Compression
System.Net
System.Net
System.Net.Sockets
System.Net.Sockets
SocketAsyncOperation
SocketAsyncOperation
OperatingSystem
OperatingSystem
System.Reflection
System.Reflection
System.Runtime.CompilerServices
System.Runtime.CompilerServices
System.Runtime.InteropServices
System.Runtime.InteropServices
System.Security.AccessControl
System.Security.AccessControl
System.Security.Cryptography
System.Security.Cryptography
System.Security.Principal
System.Security.Principal
WindowsBuiltInRole
WindowsBuiltInRole
WindowsIdentity
WindowsIdentity
WindowsPrincipal
WindowsPrincipal
System.Text
System.Text
System.Threading
System.Threading
FormWindowState
FormWindowState
#=qmLTtz8OEDrkzFTzYkI_Dg1dvKwiGw9blNcZSU_QqMsg=
#=qmLTtz8OEDrkzFTzYkI_Dg1dvKwiGw9blNcZSU_QqMsg=
.cctor
.cctor
.ctor
.ctor
ClosePipe
ClosePipe
PipeExists
PipeExists
#=qNn8WS2rooUJUoMsG84mQ7PkK4IQF8$E42cyDjfL7Kqc=
#=qNn8WS2rooUJUoMsG84mQ7PkK4IQF8$E42cyDjfL7Kqc=
#=qwSqLSPEuM8lJy4sOeuH92YjPodcLquqdG$OodozwC60=
#=qwSqLSPEuM8lJy4sOeuH92YjPodcLquqdG$OodozwC60=
#=qiY1B9yU2oVkPHxhn$y67SFTP8x1Jb0botGqdUGkdpQg=
#=qiY1B9yU2oVkPHxhn$y67SFTP8x1Jb0botGqdUGkdpQg=
CreatePipe
CreatePipe
PipeCreated
PipeCreated
#=q85afbI_HcqBFOZnC0iAqsNghLb3LsuyjFtpLEYYoPX8=
#=q85afbI_HcqBFOZnC0iAqsNghLb3LsuyjFtpLEYYoPX8=
#=q$fGRvwQxjFKeY$SH10p0pyPTU$R77VMKr3CcLFQeQ2Y=
#=q$fGRvwQxjFKeY$SH10p0pyPTU$R77VMKr3CcLFQeQ2Y=
#=q6wR5WMLGkL9afTpqmWsw9g==
#=q6wR5WMLGkL9afTpqmWsw9g==
SetThreadExecutionState
SetThreadExecutionState
RegOpenKeyEx
RegOpenKeyEx
RegCloseKey
RegCloseKey
ContainsKey
ContainsKey
PipeClosed
PipeClosed
get_Key
get_Key
GetExecutingAssembly
GetExecutingAssembly
set_Key
set_Key
get_ExecutablePath
get_ExecutablePath
OpenSubKey
OpenSubKey
set_UseShellExecute
set_UseShellExecute
set_WindowStyle
set_WindowStyle
GetPublicKeyToken
GetPublicKeyToken
get_Port
get_Port
get_LastOperation
get_LastOperation
set_WindowState
set_WindowState
8.0.0.0
8.0.0.0
System.Windows.Forms.Form
System.Windows.Forms.Form
My.MyProject.Forms
My.MyProject.Forms
4System.Web.Services.Protocols.SoapHttpClientProtocol
4System.Web.Services.Protocols.SoapHttpClientProtocol
$3983653b-cb38-49f2-8acb-9d272a46ef2f
$3983653b-cb38-49f2-8acb-9d272a46ef2f
1.2.2.0
1.2.2.0
_CorExeMain
_CorExeMain
mscoree.dll
mscoree.dll
KlSSh
KlSSh
YQ\û
YQ\û
.pesz
.pesz
.lx,E
.lx,E
.Wtua
.Wtua
iÄ%5
iÄ%5
x.oN.v]
x.oN.v]
f.xd!>
f.xd!>
&%U(J
&%U(J
:):9.Oc
:):9.Oc
.FF[Z
.FF[Z
'_~.nr%
'_~.nr%
~e.Xq
~e.Xq
Y%.cY|
Y%.cY|
.zR&'}
.zR&'}
dM.dC
dM.dC
z.Khv
z.Khv
HYuRL
HYuRL
H.ikk,
H.ikk,
7.SJ0
7.SJ0
A.VE
A.VE
-L4}lz
-L4}lz
G%sG}
G%sG}
?-w}VA
?-w}VA
hT.sie
hT.sie
I.hz"
I.hz"
v%S#U
v%S#U
@`%FIf
@`%FIf
P}.WN
P}.WN
(j`!%C
(j`!%C
C%sId
C%sId
j?kÃ
j?kÃ
.Ee;=
.Ee;=
m%7xI:
m%7xI:
j#a.xb`
j#a.xb`
=79%s
=79%s
.fbN[U
.fbN[U
^;%U1
^;%U1
xdR%F
xdR%F
%Upe_
%Upe_
TX%9u=
TX%9u=
.pwg>v
.pwg>v
([%c?
([%c?
%F\6i&
%F\6i&
2.VrIs
2.VrIs
=JORkcRt
=JORkcRt
_*.MR
_*.MR
9[1%X
9[1%X
uR%F'
uR%F'
m;%XX|
m;%XX|
[M\E`h.MNo
[M\E`h.MNo
%original file name%.exe_1016_rwx_00A2A000_00002000:
okEy
okEy
%original file name%.exe_1016_rwx_033A0000_00010000:
{@0 {`0 {01 {@1 {
{@0 {`0 {01 {@1 {