Trojan.Win32.IRCbot.dfr (Kaspersky), Trojan.Ciusky.Gen.7 (AdAware), Backdoor.Win32.PcClient.FD, Installer.Win32.InnoSetup.FD, Installer.Win32.InnoSetup.2.FD, SearchProtectToolbar_pcap.YR, GenericInjector.YR, GenericIRCBot.YR, GenericDownloader.YR, GenericAutorunWorm.YR, InstallerInnoSetup.YR, BankerGeneric.YR (Lavasoft MAS)Behaviour: Banker, Trojan, Backdoor, Worm, Installer, WormAutorun, IRCBot
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 986e2c6fd07497ae09cffcb80fe556ee
SHA1: 88e543c9961979eccd518344a8929285b5874d4f
SHA256: 43d5b460cab5e4b4610758bad345e0708528f3fa2f8f272e42f9ddc95679bbc9
SSDeep: 196608: vWLidlkSU 9OZIpfM/F6Bq6XMLXR2q0qRpH0GlHGT9: vWL8l6 ha/Mo6X h2 LH0ss9
Size: 10236910 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-06-09 16:19:49
Analyzed on: WindowsXPESX SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer. |
IRCBot | A bot can communicate with command and control servers via IRC channel. |
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1456
youtube_downloader_hd_setup1.exe:1316
netsh.exe:1852
netsh.exe:1816
mscorsvw.exe:1912
service.exe:1488
WinServices.exe:1256
WinServices.exe:664
The Trojan injects its code into the following process(es):
RunDll32.exe:1068
RunDll32.exe:628
service.exe:496
youtube_downloader_hd_setup1.tmp:912
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:1456 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
The Trojan deletes the following file(s):
The process youtube_downloader_hd_setup1.exe:1316 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-D10QC.tmp\youtube_downloader_hd_setup1.tmp (5442 bytes)
The process RunDll32.exe:1068 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%System%\wbem\Logs\wbemprox.log (658 bytes)
The process RunDll32.exe:628 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%System%\wbem\Logs\wbemprox.log (26488 bytes)
The process WinServices.exe:1256 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%System%\service.exe (7726 bytes)
The process youtube_downloader_hd_setup1.tmp:912 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-MMMT0.tmp\OCSetupHlp.dll (6841 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-MMMT0.tmp\_isetup\_RegDLL.tmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-MMMT0.tmp\_isetup\_shfoldr.dll (23 bytes)
Registry activity
The process %original file name%.exe:1456 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FB 39 DA 5D 71 CE B0 F1 27 F1 F1 B1 43 5C 17 9A"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\D:\Documents and Settings\"%CurrentUserName%"\WinServices]
"winservices.exe" = "WinServices"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\D:\Documents and Settings\"%CurrentUserName%"\WinServices]
"youtube_downloader_hd_setup1.exe" = "Youtube Downloader HD Setup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process youtube_downloader_hd_setup1.exe:1316 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "63 DF AE 3F A6 F1 03 47 1A 93 6E BD 63 68 74 3B"
The process netsh.exe:1852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"BitNames" = " NAP_TRACE_BASE NAP_TRACE_NETSH"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"Guid" = "710adbf0-ce88-40b4-a50d-231ada6593f0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"Guid" = "b0278a28-76f1-4e15-b1df-14b209a12613"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6D 27 53 50 8B A9 CE 8A AE 7C 19 28 FA 0C E8 B1"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"ControlFlags" = "1"
The process netsh.exe:1816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"BitNames" = " NAP_TRACE_BASE NAP_TRACE_NETSH"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"Guid" = "710adbf0-ce88-40b4-a50d-231ada6593f0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"Guid" = "b0278a28-76f1-4e15-b1df-14b209a12613"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "93 04 B8 1C 87 7A C2 8B CF A7 DD 00 F1 D7 BF AD"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"ControlFlags" = "1"
The process RunDll32.exe:1068 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5F 52 35 E2 79 BF 15 32 E1 7C 4D 0D 73 B4 5A 5D"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 16 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process RunDll32.exe:628 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0\HELPDIR]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\is-MMMT0.tmp"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0]
"(Default)" = "OCVBValidateLib"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0\FLAGS]
"(Default)" = "0"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows Script\Settings]
"JITDebug" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 17 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A7 F3 20 4E 3A 7D D2 F9 4B 90 8E 7B 28 A6 85 F1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0\0\win32]
"(Default)" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\is-MMMT0.tmp\OCSetupHlp.dll"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following registry key(s):
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0\FLAGS]
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0\HELPDIR]
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0]
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0\0\win32]
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}]
[HKCR\TypeLib\{1A720F5A-8FE4-4A0F-9B3A-494BF58B0813}\1.0\0]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process mscorsvw.exe:1912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\State]
"AccumulatedWaitIdleTime" = "2340000"
The process service.exe:496 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 18 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A 33 67 9F E3 37 81 CE 90 CE E4 53 DD 82 D7 C9"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Win - Services" = "service.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Runservices]
"Win - Services" = "service.exe"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Win - Services" = "service.exe"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process service.exe:1488 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "60 EB 4C 22 DD DB 3B D1 F1 9E AD 25 21 EA FC A2"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"WinServices" = "C:\DOCUME~1\"%CurrentUserName%"\WinServices\WinServices.exe"
The process WinServices.exe:1256 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 F1 00 22 17 31 1A C4 F8 DA 93 07 EA EE C0 F8"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
The process WinServices.exe:664 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1B 77 DE A2 F5 27 9F 2E F6 33 14 D3 F1 7B 4A B6"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"WinServices" = "C:\DOCUME~1\"%CurrentUserName%"\WinServices\WinServices.exe"
The process youtube_downloader_hd_setup1.tmp:912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "31 14 49 FD F1 4E 51 98 B1 4C 29 FE BB 10 45 C1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
Dropped PE files
MD5 | File path |
---|---|
e51ea3eedbf0065bd0e1b837e6b43086 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-D10QC.tmp\youtube_downloader_hd_setup1.tmp |
a5b88a7e99f6bb3017d04b689afe42eb | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-MMMT0.tmp\OCSetupHlp.dll |
0ee914c6f0bb93996c75941e1ad629c6 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-MMMT0.tmp\_isetup\_RegDLL.tmp |
92dc6ef532fbb4a5c3201469a5b5eb63 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-MMMT0.tmp\_isetup\_shfoldr.dll |
709e489388e6fe5c0553c8349db3e937 | c:\WINDOWS\system32\service.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1456
youtube_downloader_hd_setup1.exe:1316
netsh.exe:1852
netsh.exe:1816
mscorsvw.exe:1912
service.exe:1488
WinServices.exe:1256
WinServices.exe:664 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\is-D10QC.tmp\youtube_downloader_hd_setup1.tmp (5442 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%System%\wbem\Logs\wbemprox.log (658 bytes)
%System%\service.exe (7726 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-MMMT0.tmp\OCSetupHlp.dll (6841 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-MMMT0.tmp\_isetup\_RegDLL.tmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-MMMT0.tmp\_isetup\_shfoldr.dll (23 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Win - Services" = "service.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Runservices]
"Win - Services" = "service.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Win - Services" = "service.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"WinServices" = "C:\DOCUME~1\"%CurrentUserName%"\WinServices\WinServices.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 74526 | 74752 | 4.54396 | a8692f5ba740240ef0f9a827376f76f9 |
.rdata | 81920 | 7445 | 7680 | 3.46159 | d4f36accffde0bf520f52486679ccf0d |
.data | 90112 | 96036 | 512 | 2.46008 | b6c7edb5b7fec47a37a622cc5d71f3f4 |
.CRT | 188416 | 32 | 512 | 0.273198 | 439411041ee0b8261668525c5c132cd9 |
.rsrc | 192512 | 21440 | 21504 | 3.58037 | 0d498d13c02bd930d48405a3c11eeb71 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1
5d35329ccc9712ccf7676cf85ef40239
Network Activity
URLs
URL | IP |
---|---|
hxxp://api.opencandy.com/?bn=3&bv=6.00.2900.5512&clientv=40&cltzone=120&csk=06456538756839525933-12365717287063912902&language=en,en&method=get_offers&mstime=0.968&os=WIN5.1SP3&product_key=b6e7f294ab12f3477346b5f53eed5fd5&v=1.0&signature=c12b7e412d505c46427a0b5b7f89d2b9 | 162.209.122.21 |
hxxp://api.opencandy.com/?bn=3&bv=6.00.2900.5512&clientv=40&cltzone=120&csk=06456538756839525933-12365717287063912902&language=en,en&method=get_offers&mstime=0.406&os=WIN5.1SP3&product_key=fdeb68345c10f37356b66f7a9ff895fb&v=1.0&signature=16ade015fd3dbcd8437b19dc36a2ce10 | 162.209.122.21 |
hxxp://a469.d.akamai.net/templates/3212/0/63289.png | |
hxxp://a469.d.akamai.net/templates/7201/0/56564.png | |
hxxp://cdn3.opencandy.com/templates/7201/0/56564.png | 184.84.243.41 |
hxxp://cdn3.opencandy.com/templates/3212/0/63289.png | 184.84.243.41 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /templates/7201/0/56564.png HTTP/1.1
Host: cdn3.opencandy.com
Accept: */*
HTTP/1.1 200 OK
x-amz-id-2: mkWvH5okw/8CW/ESXmmDuviUjIZ7o6GP51qnUN1CvoPlMd2AIwh dNhdPPZEMkUQ
x-amz-request-id: DEA0CAD6BC0666A3
Last-Modified: Sat, 12 Jul 2014 12:06:59 GMT
ETag: "b3a16b36134e272508820d78cac3333a"
Accept-Ranges: bytes
Content-Type: image/png
Content-Length: 23193
Server: AmazonS3
Cache-Control: max-age=300
Date: Mon, 17 Nov 2014 06:19:13 GMT
Connection: keep-alive
.PNG........IHDR.......;........8.. .IDATx...{\Tu....HHx.d.iB......"!*.V./yI..L.o.ff.V.r..\/[..ii...jjd......7$......,...h......p...8....x...s>.......8g.y.......B.!t.R...!...4...!..:..U.!...l.B.!..ds.B.!t&...B..3.\..B....*..B.L6W!..Bg...!..:.u.....0..xyy....\...`.`0.c.....U...[......k:.!...i.\-...;w.`0...Cvv....O...`.....G.V9 .....h.r[.....c0.X.|yM..Yi......P....i.\]\\X.x1u........7..../.z.j.F..A........;..7.....r[..y....._.!.g.o....a6..X.~=.N.b.....y.OOO.|.M.._....c..........2..Jo..........e.....".z.!. X.[..V..l6..... W.r..S.L! .///....5k.%%%.c.......///|||........c..;...g.y...H..=...d..m...c2..6m..<G9.HLL.W.^.L&.1.V."88...|.f....`.o....edd.......i..5....*..(..c4....F...INN...(....e./...3..s.7o...7......;.M.6.0{.l.4iBaa!O=...6mb..Y\.x....3s.Lf.....C..................y.&%%%.....>...K.r..E.6m.{.....3 .k.X.X,l...../.l.2..?....9p....rss..........c..4........R\\... ..{...$%¦.9v.....\.x.i.........B.....?.>yyyl...B<..........3i.$RRR....p.3......5k.9r$.~.-/....<. W!....6W///.....g.}.6!!!..=....x...{......#...`..1..X.....*...?..K.........9}.4.=.....4h..!C...y....uq!11...`....:t(M.6.../.t.wHH...........O@@........N.<.)........xxx.......111,\.Ps.>...~..........qss.I.&e.qv>J...cG....{>..#Myvww.....B..:{Bll,........,Y...w..5m........7o.....<..C..6((.....p..1...;g..J].rE....w....s..)~..G.]...z.Y...<..Xqq1.}..`?.O<.....].}..<..CDEE1k.,.....u.f.....1.by...*.g.A......,.\......U.....v.j.s.v...Q.YO.n...m.....U.........LBB..'O.......UKl`?........ m...N.:....|..G..1Bs...wuu.......<.n
<<< skipped >>>
GET /?bn=3&bv=6.00.2900.5512&clientv=40&cltzone=120&csk=06456538756839525933-12365717287063912902&language=en,en&method=get_offers&mstime=0.968&os=WIN5.1SP3&product_key=b6e7f294ab12f3477346b5f53eed5fd5&v=1.0&signature=c12b7e412d505c46427a0b5b7f89d2b9 HTTP/1.1
Host: api.opencandy.com
Accept: */*
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Mon, 17 Nov 2014 06:18:54 GMT
Server: Apache
X-Robots-Tag: noindex
Last-Modified: Mon, 17 Nov 2014 06:18:54 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: text/xml
2000..<?xml version="1.0"?>.<get_offers>. <installer_md5s>. <md5>0</md5>. </installer_md5s>. <session_key>2111ba69daa39bd9bcdcbcbc24b8a6bb</session_key><product_name><![CDATA[Youtube Downloader HD]]></product_name>. <offer id="7364" instance_id="57378" language="en" advertiser_id="1034"> . <name><![CDATA[Entrusted Search Protect]]></name>. <exclusions tags="cat_search,cat_homepage"/>. <filters applies="" keys=""/>. <package_url>hXXp://cdn3.opencandy.com/p/1213/dl/dm319g.exe</package_url>. <package_md5>5902902ecbf5633ef7116409f8c0fe45</package_md5>. <package_filesize>307672</package_filesize>. <package_tool_version/>.<styles><image_source name="imgsrc">hXXp://cdn3.opencandy.com/templates/7364/0/57378.png</image_source></styles>. <banner_title><![CDATA[Install Entrusted Search Protect]]></banner_title>. <banner_description><![CDATA[Recommended by Youtube Downloader HD]]></banner_description>.<offer_settings pass_selected="true" concat_selected_separator=";" selected_prefix="/OCCHECKS="/><panel>.......<image name="main" imagesource="imgsrc" size="471,220" position="0,0" normalimagefrom="0,0"/> ..<image imagesource="imgsrc" size="420x15" position="5000,134" normalimagefrom="38,259" triggers="offershown:any:show,se
<<< skipped >>>
GET /?bn=3&bv=6.00.2900.5512&clientv=40&cltzone=120&csk=06456538756839525933-12365717287063912902&language=en,en&method=get_offers&mstime=0.406&os=WIN5.1SP3&product_key=fdeb68345c10f37356b66f7a9ff895fb&v=1.0&signature=16ade015fd3dbcd8437b19dc36a2ce10 HTTP/1.1
Host: api.opencandy.com
Accept: */*
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Mon, 17 Nov 2014 06:18:54 GMT
Server: Apache
X-Robots-Tag: noindex
Last-Modified: Mon, 17 Nov 2014 06:18:54 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: text/xml
2000..<?xml version="1.0"?>.<get_offers>. <installer_md5s>. <md5>0</md5>. </installer_md5s>. <session_key>294fda649a19d6b8e8a46b1799ae3cbb</session_key><product_name><![CDATA[Youtube Downloader HD]]></product_name>. <offer id="3212" instance_id="63289" language="en" advertiser_id="667"> . <name><![CDATA[SpeedUpMyPC 2014 ]]></name>. <exclusions tags="cat_utility_registry"/>. <filters applies="" keys=""/>. <package_url>hXXp://cdn3.opencandy.com/p/1213/dl/dm319g.exe</package_url>. <package_md5>5902902ecbf5633ef7116409f8c0fe45</package_md5>. <package_filesize>307672</package_filesize>. <package_tool_version/>.<styles><image_source name="imgsrc">hXXp://cdn3.opencandy.com/templates/3212/0/63289.png</image_source></styles>. <banner_title><![CDATA[Install SpeedUpMyPC 2014 ]]></banner_title>. <banner_description><![CDATA[Recommended by Youtube Downloader HD]]></banner_description>.<offer_settings pass_selected="true" concat_selected_separator=";" selected_prefix="/OCCHECKS="/><panel>.......<image name="main" imagesource="imgsrc" size="471,220" position="0,0" normalimagefrom="0,0"/> ..<image imagesource="imgsrc" size="432x50" position="18,70" normalimagefrom="36,226" triggers="offershown:any:show,select:304:show,select:
<<< skipped >>>
GET /templates/3212/0/63289.png HTTP/1.1
Host: cdn3.opencandy.com
Accept: */*
HTTP/1.1 200 OK
x-amz-id-2: eHIbA/THfo27QIJ4amsYABjyuXIy/MJi2/6T/IuaUKDi7xlxgrQobzcSh5uktAiXGHTJT1YtaEY=
x-amz-request-id: CE2191C328D26881
Last-Modified: Wed, 29 Oct 2014 21:55:03 GMT
ETag: "b6bdeb14f47bcd070156d9394127c7ef"
Accept-Ranges: bytes
Content-Type: image/png
Content-Length: 18683
Server: AmazonS3
Cache-Control: max-age=296
Date: Mon, 17 Nov 2014 06:18:59 GMT
Connection: keep-alive
.PNG........IHDR.......h........a.. .IDATx...{\T.......xa.h..(...".H..(.!.^.F /......G...%.L....i...Hy...F.o...H!..M.""...............~>~.={......3{...........H2&M........ .....\...$..JDD$1&W""".1....I.....HbL.DDD.cr%""... ........................;.....G.... W.<......$K..N..L&.....O..%.....\...G7u(.$OOO..;..}.QS.BD..2..1....<yR.&%...........6n.8............!"z.<...3f...q..................C.B..#$$.eeeHOOG.~.....n...../_.'''..."**....EEE....\...............kkkt.........,Y.'''(...x......:.C...7o..M.....<.r.......5k`oo.///......X,.......J..\.Gxx8...........=.J#3.......fff...FJJ.D....."ir....k...3g..,X....c...x....h.".o....]...sQXX. .Z...P\\.w.y..N....;......l.={....HJJBll,\\\PTT...h\.pAp[]g..E..=jm3....x.......(....u..e..dff...c8r....8...x..Z....s.....k.B.....spuu...[..G,..c...PPP...J|.....};RRRp...dgg.....D............\.DDO..r[x................t899............# .J..={......`..m..m..-......b......F.>}...ob...z.....@..mkm3....|DFF...^......9r$lll..o...........R.777..\.....ann....C.Vk.5.ONN.`,^^^pvv.........j..'O...Q...q........5,--q..5.9$"..I.\.4k..&&&.y.......h......w."&&F..G.=........(DDD`..i..t.i..`.......F.f....}...g.F.......D......$==...7o...p.......=...H..k\.zU..........ZYY.w.y.;v.........z.*...q...|.......;.o..X.v-...Q]].m..!11. V....71e..DDD //Op[]].t...'Dc../ ..6l...........6m.Z.FII.6o......f.p,b<<<.............S.......?...R).x...$.^..|.Z.{.....@HH.<==.z.j......?FQQ.z....W."""....8t.P..T*........../..............q..E...../.@VV........V.....j..dL........../* 1h. ......Spw
<<< skipped >>>
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
youtube_downloader_hd_setup1.exe_1316:
.idata
.idata
.rdata
.rdata
P.reloc
P.reloc
P.rsrc
P.rsrc
kernel32.dll
kernel32.dll
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
File I/O error %d
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
lzmadecompsmall: %s
LzmaDecode failed (%d)
LzmaDecode failed (%d)
shell32.dll
shell32.dll
/SL5="$%x,%d,%d,
/SL5="$%x,%d,%d,
Inno Setup Setup Data (5.4.2)
Inno Setup Setup Data (5.4.2)
Inno Setup Messages (5.1.11)
Inno Setup Messages (5.1.11)
user32.dll
user32.dll
oleaut32.dll
oleaut32.dll
advapi32.dll
advapi32.dll
RegOpenKeyExA
RegOpenKeyExA
RegCloseKey
RegCloseKey
GetWindowsDirectoryA
GetWindowsDirectoryA
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
ExitWindowsEx
ExitWindowsEx
comctl32.dll
comctl32.dll
name="JR.Inno.Setup"
name="JR.Inno.Setup"
version="1.0.0.0"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
publicKeyToken="6595b64144ccf1df"
true
true
!'%s' is not a valid integer value('%s' is not a valid floating point value
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
I/O error %d
Integer overflow Invalid floating point operation
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
Invalid variant operation"Variant method calls not supported
External exception %x
External exception %x
YoutubeDownloaderHD.com
YoutubeDownloaderHD.com
2.9.9.13
2.9.9.13
youtube_downloader_hd_setup1.tmp_912:
.idata
.idata
.rdata
.rdata
P.reloc
P.reloc
P.rsrc
P.rsrc
kernel32.dll
kernel32.dll
%s_%d
%s_%d
EInvalidOperation
EInvalidOperation
TKeyEvent
TKeyEvent
TKeyPressEvent
TKeyPressEvent
crSQLWait
crSQLWait
t.HtR
t.HtR
EInvalidGraphicOperation
EInvalidGraphicOperation
TWindowState
TWindowState
poProportional
poProportional
KeyPreview
KeyPreview
WindowState
WindowState
OnKeyDown
OnKeyDown
OnKeyPress
OnKeyPress
OnKeyUp
OnKeyUp
CTL3D32.DLL
CTL3D32.DLL
PasswordChar
PasswordChar
ssHorizontal
ssHorizontal
OnKeyUpheB
OnKeyUpheB
RegDeleteKeyExA
RegDeleteKeyExA
advapi32.dll
advapi32.dll
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
user32.dll
user32.dll
shlwapi.dll
shlwapi.dll
TPSExec
TPSExec
TPSRuntimeClassImporter
TPSRuntimeClassImporter
TPSExportedVar
TPSExportedVar
Cannot Import
Cannot Import
Interface not supported
Interface not supported
Uh.oD
Uh.oD
TPSCustomDebugExec
TPSCustomDebugExec
TPSDebugExec
TPSDebugExec
uxtheme.dll
uxtheme.dll
oleacc.dll
oleacc.dll
RICHED20.DLL
RICHED20.DLL
RICHED32.DLL
RICHED32.DLL
File I/O error %d
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
shell32.dll
shell32.dll
HKEY_CLASSES_ROOT
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
HKEY_DYN_DATA
WININIT.INI
WININIT.INI
t.Htb
t.Htb
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegCreateKeyEx
RegOpenKeyEx
RegOpenKeyEx
sfc.dll
sfc.dll
cmd.exe" /C "
cmd.exe" /C "
COMMAND.COM" /C
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations
PendingFileRenameOperations2
PendingFileRenameOperations2
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
OLEAUT32.DLL
OLEAUT32.DLL
Uh.kE
Uh.kE
Log opened. (Time zone: UTC%s%.2u:%.2u)
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
%s Log %s #%.3u.txt
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
regsvr32.exe"
regsvr32.exe"
Spawning _RegDLL.tmp
Spawning _RegDLL.tmp
_isetup\_RegDLL.tmp
_isetup\_RegDLL.tmp
_RegDLL.tmp %u %u
_RegDLL.tmp %u %u
REGDLL failed with exit code 0x%x
REGDLL failed with exit code 0x%x
REGDLL mutex wait failed (%d, %d)
REGDLL mutex wait failed (%d, %d)
REGDLL returned unknown result code %d
REGDLL returned unknown result code %d
Cannot register 64-bit DLLs on this version of Windows
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
CreateNamedPipe
SetNamedPipeHandleState
SetNamedPipeHandleState
helper %d 0x%x
helper %d 0x%x
Helper process PID: %u
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
Helper process exited with failure code: 0x%x
TransactNamedPipe
TransactNamedPipe
TransactNamedPipe/GetOverlappedResult
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
v1.1.4322
.NET Framework version %s not found
.NET Framework version %s not found
Fusion.dll
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
MoveFileEx failed (%d).
Deleting directory: %s
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Failed to delete directory (%d).
Deleting file: %s
Deleting file: %s
Failed to delete the file; it may be in use (%d).
Failed to delete the file; it may be in use (%d).
ExtractRecData: Unicode data unsupported by this build
ExtractRecData: Unicode data unsupported by this build
The file appears to be in use (%d). Will delete on restart.
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec filename:
Running Exec parameters:
Running Exec parameters:
CreateProcess failed (%d).
CreateProcess failed (%d).
Process exit code: %u
Process exit code: %u
Running ShellExec filename:
Running ShellExec filename:
Running ShellExec parameters:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
Unregistering font: %s
zlib: Internal error. Code %d
zlib: Internal error. Code %d
1.2.1
1.2.1
bzlib: Internal error. Code %d
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
DecodeToBuf failed (%d)
TPasswordEdit
TPasswordEdit
TPasswordEdit
TPasswordEdit
PasswordEdit(
PasswordEdit(
Password
Password
c:\directory
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
PasswordPage
PasswordPage
PasswordLabel
PasswordLabel
PasswordEdit
PasswordEdit
PasswordEditLabel$
PasswordEditLabel$
Could not find page with ID %d
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
%s\%s_is1
CheckPassword
CheckPassword
PrepareToInstall failed: %s
PrepareToInstall failed: %s
Need to restart Windows? %s
Need to restart Windows? %s
/:*?"|
/:*?"|
\/:*?"|
\/:*?"|
%s-%d.bin
%s-%d.bin
%s-%d%s.bin
%s-%d%s.bin
..\DISK%d\
..\DISK%d\
Asking user for new disk containing "%s".
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Uninstall\
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.4.3 (a)
5.4.3 (a)
URLInfoAbout
URLInfoAbout
URLUpdateInfo
URLUpdateInfo
Creating directory: %s
Creating directory: %s
Setting permissions on directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
Failed to set NTFS compression state (%d).
IMsg
IMsg
Failed to set value in Fonts registry key.
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Setting permissions on file: %s
Failed to set permissions on file (%d).
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of our file: %s
Time stamp of existing file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
Cannot install files to 64-bit locations on this version of Windows
desktop.ini
desktop.ini
.ShellClassInfo
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}
{0AFACED1-E828-11D1-9187-B532F1E9575D}
target.lnk
target.lnk
Filename: %s
Filename: %s
Desktop.ini
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Software\Microsoft\Windows\CurrentVersion\App Paths\
Setting permissions on registry key: %s\%s
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
LoggedMsgBox returned an unexpected value. Assuming Cancel.
Fatal exception during installation process (%s):
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFile: The file "%s" was not found
Invalid symbol '%s' found
Invalid symbol '%s' found
Invalid token '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx
ShellExecuteEx returned hProcess=0
ShellExecuteEx returned hProcess=0
Wnd=$%x
Wnd=$%x
FormKeyDown
FormKeyDown
PasswordCheckHash
PasswordCheckHash
Expression error '%s'
Expression error '%s'
Cannot evaluate "%s" constant during Uninstall
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
Unknown custom message name "%s" in "cm" constant
srcexe
srcexe
Cannot expand "pf64" constant on this version of Windows
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
cmd.exe
COMMAND.COM
COMMAND.COM
\_RegDLL.tmp
\_RegDLL.tmp
REGDLL_EXE
REGDLL_EXE
\_setup64.tmp
\_setup64.tmp
_isetup\_shfoldr.dll
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
shfolder.dll
Failed to load DLL "%s"
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
64-bit Windows: %s
Processor architecture: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Defaulting to %s for suppressed message box (%s):
Message box (%s):
Message box (%s):
User chose %s.
User chose %s.
MsgBox failed.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
64-bit install mode: %s
%d.%d
%d.%d
_isetup\_isdecmp.dll
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
_isetup\_iscrypt.dll
/Password=
/Password=
/SuppressMsgBoxes
/SuppressMsgBoxes
/DETACHEDMSG
/DETACHEDMSG
-0.bin
-0.bin
Setup version: Inno Setup version 5.4.3 (a)
Setup version: Inno Setup version 5.4.3 (a)
Original Setup EXE:
Original Setup EXE:
Windows NT
Windows NT
Windows
Windows
Not restarting Windows because Setup is being run from the debugger.
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Restarting Windows.
Inno Setup version 5.4.3 (a)
Inno Setup version 5.4.3 (a)
Portions Copyright (C) 2000-2011 Martijn Laan
Portions Copyright (C) 2000-2011 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: Exec
Type: ShellExec
Type: ShellExec
Will not restart Windows automatically.
Will not restart Windows automatically.
System\CurrentControlSet\Control\Windows
System\CurrentControlSet\Control\Windows
TOutputMsgWizardPage
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
TOutputMsgMemoWizardPage
PasswordEdit
PasswordEdit
PasswordEditLabel
PasswordEditLabel
MsgLabel
MsgLabel
Msg1Label
Msg1Label
Msg2Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
Cannot call "%s" function during Setup
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Cannot call "%s" function during Uninstall
Cannot call "%s" function during non Unicode Setup or Uninstall
Cannot call "%s" function during non Unicode Setup or Uninstall
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
MSGBOX
Invalid RootKey value
Invalid RootKey value
INIKEYEXISTS
INIKEYEXISTS
GETCMDTAIL
GETCMDTAIL
REGKEYEXISTS
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
REGGETSUBKEYNAMES
CHECKFORMUTEXES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXEC
SHELLEXECASORIGINALUSER
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
Unknown custom message name "%s"
Unknown custom message name "%s"
EXITSETUPMSGBOX
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
GETWINDOWSVERSIONSTRING
%u.%.2u.%u
%u.%.2u.%u
SUPPRESSIBLEMSGBOX
SUPPRESSIBLEMSGBOX
%u.%u.%u.%u
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
Cannot disable FS redirection on this version of Windows
GetWindowsVersionEx
GetWindowsVersionEx
Runtime Error (at %d:%d):
Runtime Error (at %d:%d):
Exception "%s" at address %p
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
Not restarting Windows because Uninstall is being run from the debugger.
IMsgt
IMsgt
isRS-???.tmp
isRS-???.tmp
isRS-%.3u.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
DisableProcessWindowsGhosting
FTPF0P
FTPF0P
0123456789abcdefInno Setup Setup Data (5.4.2)
0123456789abcdefInno Setup Setup Data (5.4.2)
Inno Setup Messages (5.1.11)
Inno Setup Messages (5.1.11)
oleaut32.dll
oleaut32.dll
RegQueryInfoKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyExA
RegCloseKey
RegCloseKey
GetWindowsDirectoryA
GetWindowsDirectoryA
CreateNamedPipeA
CreateNamedPipeA
mpr.dll
mpr.dll
version.dll
version.dll
gdi32.dll
gdi32.dll
SetViewportOrgEx
SetViewportOrgEx
UnhookWindowsHookEx
UnhookWindowsHookEx
SetWindowsHookExA
SetWindowsHookExA
MapVirtualKeyA
MapVirtualKeyA
GetKeyState
GetKeyState
GetKeyNameTextA
GetKeyNameTextA
ExitWindowsEx
ExitWindowsEx
EnumWindows
EnumWindows
EnumThreadWindows
EnumThreadWindows
comctl32.dll
comctl32.dll
ole32.dll
ole32.dll
ShellExecuteExA
ShellExecuteExA
ShellExecuteA
ShellExecuteA
comdlg32.dll
comdlg32.dll
.text
.text
`.rdata
`.rdata
@.data
@.data
.pdata
.pdata
@.rsrc
@.rsrc
COMCTL32.dll
COMCTL32.dll
SHLWAPI.dll
SHLWAPI.dll
SetProcessShutdownParameters
SetProcessShutdownParameters
KERNEL32.dll
KERNEL32.dll
ADVAPI32.dll
ADVAPI32.dll
SHELL32.dll
SHELL32.dll
OLEAUT32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
publicKeyToken="6595b64144ccf1df"
`.data
`.data
.rsrc
.rsrc
@.reloc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
SOFTWARE\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
RegKey
GetWindowsDirectoryW
GetWindowsDirectoryW
RegOpenKeyA
RegOpenKeyA
SHFOLDER.dll
SHFOLDER.dll
dll\shfolder.dbg
dll\shfolder.dbg
Font.Color
Font.Color
Font.Height
Font.Height
Font.Name
Font.Name
Font.Style
Font.Style
name="JR.Inno.Setup"
name="JR.Inno.Setup"
version="1.0.0.0"
version="1.0.0.0"
true
true
Cannot assign a %s to a %s
Cannot assign a %s to a %s
Cannot create file %s
Cannot create file %s
Cannot open file %s
Cannot open file %s
Stream write error Out of memory while expanding memory stream*Can't write to a read-only resource stream.WriteObject called twice for the same instance
Stream write error Out of memory while expanding memory stream*Can't write to a read-only resource stream.WriteObject called twice for the same instance
Class %s not found
Class %s not found
Resource %s not found!Resource %s is of incorrect class
Resource %s not found!Resource %s is of incorrect class
List index out of bounds Operation not allowed on sorted string list%String list does not allow duplicates
List index out of bounds Operation not allowed on sorted string list%String list does not allow duplicates
Tab index out of bounds#A component named %s already exists$''%s'' is not a valid component name
Tab index out of bounds#A component named %s already exists$''%s'' is not a valid component name
A class named %s already exists#''%s'' is not a valid integer value
A class named %s already exists#''%s'' is not a valid integer value
Error reading %s.%s: %s
Error reading %s.%s: %s
Ancestor for '%s' not found
Ancestor for '%s' not found
Bitmap is empty!Cannot change the size of an icon$Unknown picture file extension (.%s)
Bitmap is empty!Cannot change the size of an icon$Unknown picture file extension (.%s)
Unsupported clipboard format
Unsupported clipboard format
Error creating window Cannot focus a disabled or invisible window!Control '%s' has no parent window
Error creating window Cannot focus a disabled or invisible window!Control '%s' has no parent window
%s property out of range
%s property out of range
%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex2Cannot have more than one MDI form per application
%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex2Cannot have more than one MDI form per application
Could not load CARDS.DLL
Could not load CARDS.DLL
Duplicate CardId found"An error returned from DDE ($0%x)/DDE Error - conversation not established ($0%x)0Error occurred when DDE ran out of memory ($0%x)"Unable to connect DDE conversation
Duplicate CardId found"An error returned from DDE ($0%x)/DDE Error - conversation not established ($0%x)0Error occurred when DDE ran out of memory ($0%x)"Unable to connect DDE conversation
Grid too large for operation Too many rows or columns deleted
Grid too large for operation Too many rows or columns deleted
%s on line %d
%s on line %d
''%s'' expected
''%s'' expected
%s expected
%s expected
Invalid input value7Invalid input value. Use escape key to abandon changes
Invalid input value7Invalid input value. Use escape key to abandon changes
Value must be between %d and %d
Value must be between %d and %d
''%s'' is not a valid date
''%s'' is not a valid date
''%s'' is not a valid time#''%s'' is not a valid date and time
''%s'' is not a valid time#''%s'' is not a valid date and time
Invalid file name - %s
Invalid file name - %s
All files (*.*)|*.*
All files (*.*)|*.*
&Files: (*.*)
&Files: (*.*)
Invalid clipboard format Clipboard does not support Icons
Invalid clipboard format Clipboard does not support Icons
Custom Colors Operation not supported on selected printer.There is no default printer currently selected
Custom Colors Operation not supported on selected printer.There is no default printer currently selected
Unable to write to %s
Unable to write to %s
Invalid data type for '%s'
Invalid data type for '%s'
Failed to create key %s
Failed to create key %s
Failed to set data for '%s'
Failed to set data for '%s'
Failed to get data for '%s'9Synchronize called when main VCL thread in a WaitFor call0Unknown RichEdit conversion file extension (.%s)
Failed to get data for '%s'9Synchronize called when main VCL thread in a WaitFor call0Unknown RichEdit conversion file extension (.%s)
/Menu '%s' is already being used by another form
/Menu '%s' is already being used by another form
Failed to Save Stream)StatusBar cannot have more than 64 panels!Error assigning Hot-Key to %s. %s
Failed to Save Stream)StatusBar cannot have more than 64 panels!Error assigning Hot-Key to %s. %s
Hot-Key is invalid#Window is invalid or a child window%Hot-Key is assigned to another window %s is already associated with %s!'%s' is not a valid integer value('%s' is not a valid floating point value
Hot-Key is invalid#Window is invalid or a child window%Hot-Key is assigned to another window %s is already associated with %s!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
I/O error %d
Integer overflow Invalid floating point operation
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
Invalid variant operation"Variant method calls not supported
External exception %x
External exception %x
n%USERPROFILE%
n%USERPROFILE%
r%SYSTEMROOT%
r%SYSTEMROOT%
5.50.4807.2300
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
Datos de programa%Configuraci
51.52.0.0
51.52.0.0
RunDll32.exe_628:
.text
.text
`.data
`.data
.rsrc
.rsrc
msvcrt.dll
msvcrt.dll
KERNEL32.dll
KERNEL32.dll
NTDLL.DLL
NTDLL.DLL
GDI32.dll
GDI32.dll
USER32.dll
USER32.dll
IMAGEHLP.dll
IMAGEHLP.dll
rundll32.pdb
rundll32.pdb
.....eZXnnnnnnnnnnnn3
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
O3$dS7"%U9
.manifest
.manifest
5.1.2600.5512 (xpsp.080413-2105)
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
RUNDLL.EXE
Windows
Windows
Operating System
Operating System
5.1.2600.5512
5.1.2600.5512
YThere is not enough memory to run the file %s.
YThere is not enough memory to run the file %s.
Please close other windows and try again.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Error in %s
Missing entry:%s
Missing entry:%s
Error loading %s
Error loading %s
RunDll32.exe_1068:
.text
.text
`.data
`.data
.rsrc
.rsrc
msvcrt.dll
msvcrt.dll
KERNEL32.dll
KERNEL32.dll
NTDLL.DLL
NTDLL.DLL
GDI32.dll
GDI32.dll
USER32.dll
USER32.dll
IMAGEHLP.dll
IMAGEHLP.dll
rundll32.pdb
rundll32.pdb
.....eZXnnnnnnnnnnnn3
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
O3$dS7"%U9
.manifest
.manifest
5.1.2600.5512 (xpsp.080413-2105)
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
RUNDLL.EXE
Windows
Windows
Operating System
Operating System
5.1.2600.5512
5.1.2600.5512
YThere is not enough memory to run the file %s.
YThere is not enough memory to run the file %s.
Please close other windows and try again.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Error in %s
Missing entry:%s
Missing entry:%s
Error loading %s
Error loading %s
service.exe_496:
.text
.text
`.rdata
`.rdata
@.data
@.data
.idata
.idata
.rsrc
.rsrc
@.reloc
@.reloc
Invalid allocation size: %u bytes.
Invalid allocation size: %u bytes.
Client hook allocation failure at file %hs line %d.
Client hook allocation failure at file %hs line %d.
_CrtCheckMemory()
_CrtCheckMemory()
_CrtIsValidHeapPointer(pUserData)
_CrtIsValidHeapPointer(pUserData)
Allocation too large or negative: %u bytes.
Allocation too large or negative: %u bytes.
Client hook re-allocation failure at file %hs line %d.
Client hook re-allocation failure at file %hs line %d.
DAMAGE: after %hs block (#%d) at 0xX.
DAMAGE: after %hs block (#%d) at 0xX.
DAMAGE: before %hs block (#%d) at 0xX.
DAMAGE: before %hs block (#%d) at 0xX.
memory check error at 0xX = 0xX, should be 0xX.
memory check error at 0xX = 0xX, should be 0xX.
%hs located at 0xX is %u bytes long.
%hs located at 0xX is %u bytes long.
%hs allocated at file %hs(%d).
%hs allocated at file %hs(%d).
DAMAGE: on top of Free block at 0xX.
DAMAGE: on top of Free block at 0xX.
Bad memory block found at 0xX.
Bad memory block found at 0xX.
_CrtMemCheckPoint: NULL state pointer.
_CrtMemCheckPoint: NULL state pointer.
_CrtMemDifference: NULL state pointer.
_CrtMemDifference: NULL state pointer.
crt block at 0xX, subtype %x, %u bytes long.
crt block at 0xX, subtype %x, %u bytes long.
normal block at 0xX, %u bytes long.
normal block at 0xX, %u bytes long.
client block at 0xX, subtype %x, %u bytes long.
client block at 0xX, subtype %x, %u bytes long.
%hs(%d) :
%hs(%d) :
#File Error#(%d) :
#File Error#(%d) :
Data: %s
Data: %s
%s(%d) : %s
%s(%d) : %s
_CrtDbgReport: String too long or IO Error
_CrtDbgReport: String too long or IO Error
Second Chance Assertion Failed: File %s, Line %d
Second Chance Assertion Failed: File %s, Line %d
user32.dll
user32.dll
Debug %s!
Debug %s!
Program: %s%s%s%s%s%s%s%s%s%s%s
Program: %s%s%s%s%s%s%s%s%s%s%s
portuguese-brazilian
portuguese-brazilian
VVV.symantec.com
VVV.symantec.com
127.0.0.1
127.0.0.1
securityresponse.symantec.com
securityresponse.symantec.com
symantec.com
symantec.com
VVV.sophos.com
VVV.sophos.com
sophos.com
sophos.com
VVV.mcafee.com
VVV.mcafee.com
mcafee.com
mcafee.com
liveupdate.symantecliveupdate.com
liveupdate.symantecliveupdate.com
VVV.viruslist.com
VVV.viruslist.com
viruslist.com
viruslist.com
f-secure.com
f-secure.com
VVV.f-secure.com
VVV.f-secure.com
kaspersky.com
kaspersky.com
kaspersky-labs.com
kaspersky-labs.com
VVV.avp.com
VVV.avp.com
VVV.kaspersky.com
VVV.kaspersky.com
avp.com
avp.com
VVV.networkassociates.com
VVV.networkassociates.com
networkassociates.com
networkassociates.com
VVV.ca.com
VVV.ca.com
ca.com
ca.com
mast.mcafee.com
mast.mcafee.com
my-etrust.com
my-etrust.com
VVV.my-etrust.com
VVV.my-etrust.com
download.mcafee.com
download.mcafee.com
dispatch.mcafee.com
dispatch.mcafee.com
secure.nai.com
secure.nai.com
nai.com
nai.com
VVV.nai.com
VVV.nai.com
update.symantec.com
update.symantec.com
updates.symantec.com
updates.symantec.com
us.mcafee.com
us.mcafee.com
liveupdate.symantec.com
liveupdate.symantec.com
customer.symantec.com
customer.symantec.com
rads.mcafee.com
rads.mcafee.com
trendmicro.com
trendmicro.com
VVV.trendmicro.com
VVV.trendmicro.com
VVV.grisoft.com
VVV.grisoft.com
CDKey
CDKey
prvkey
prvkey
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
Microsoft Windows Product ID
Microsoft Windows Product ID
codkey
codkey
Software\Electronic Arts\EA GAMES\Global Operations\ergc
Software\Electronic Arts\EA GAMES\Global Operations\ergc
Global Operations
Global Operations
Software\Electronic Arts\EA Sports\FIFA 2002\ergc
Software\Electronic Arts\EA Sports\FIFA 2002\ergc
Software\Electronic Arts\EA Sports\FIFA 2003\ergc
Software\Electronic Arts\EA Sports\FIFA 2003\ergc
Software\Electronic Arts\EA Sports\FIFA 2006\ergc
Software\Electronic Arts\EA Sports\FIFA 2006\ergc
Software\Electronic Arts\EA Sports\NHL 2002\ergc
Software\Electronic Arts\EA Sports\NHL 2002\ergc
Software\Electronic Arts\EA Sports\NHL 2003\ergc
Software\Electronic Arts\EA Sports\NHL 2003\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2002\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2002\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2003\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2003\ergc
Software\Techland\Chrome
Software\Techland\Chrome
Chrome
Chrome
base\mp\sof2key
base\mp\sof2key
nwncdkey.ini
nwncdkey.ini
Key1=
Key1=
Key2=
Key2=
Key3=
Key3=
KeyCode
KeyCode
3DMark06 Key
3DMark06 Key
Password
Password
Nod32 Pass
Nod32 Pass
%s\%s
%s\%s
%s CD Key: (%s).
%s CD Key: (%s).
NOTICE %s :Authentication failed (%s!%s).
NOTICE %s :Authentication failed (%s!%s).
NOTICE %s :Your attempt has been logged.
NOTICE %s :Your attempt has been logged.
[MAIN]: Password accepted.
[MAIN]: Password accepted.
[MAIN]: Failed to login user: %s, too many logins already.
[MAIN]: Failed to login user: %s, too many logins already.
$rndnick
$rndnick
rndnick
rndnick
NICK %s
NICK %s
[MAIN]: Random nick change to: %s.
[MAIN]: Random nick change to: %s.
QUIT :%s
QUIT :%s
[THREADS]: Failed to start list thread, error: .
[THREADS]: Failed to start list thread, error: .
[PROCS]: Failed to start listing thread, error: .
[PROCS]: Failed to start listing thread, error: .
cdkeys
cdkeys
[CDKEYS]: Search completed.
[CDKEYS]: Search completed.
.::[ PassStore Executed ]::.
.::[ PassStore Executed ]::.
firefox
firefox
FireFox
FireFox
FireFox Executed.
FireFox Executed.
firefoxstop
firefoxstop
Firefox
Firefox
[FLUSHDNS]: Failed to load dnsapi.dll.
[FLUSHDNS]: Failed to load dnsapi.dll.
nick
nick
join
join
JOIN %s %s
JOIN %s %s
PART %s
PART %s
[MAIN]: Sent IRC Raw: %s.
[MAIN]: Sent IRC Raw: %s.
[THREADS]: Stopped: %d thread(s).
[THREADS]: Stopped: %d thread(s).
[THREADS]: Killed thread: %s.
[THREADS]: Killed thread: %s.
[THREADS]: Failed to kill thread: %s.
[THREADS]: Failed to kill thread: %s.
[MAIN]: Prefix changed to: '%c'.
[MAIN]: Prefix changed to: '%c'.
[SHELL]: File opened: %s
[SHELL]: File opened: %s
[SHELL]: Couldn't open file: %s
[SHELL]: Couldn't open file: %s
[MAIN]: Server changed to: '%s'.
[MAIN]: Server changed to: '%s'.
[DNS]: Lookup: %s -> %s.
[DNS]: Lookup: %s -> %s.
[PROC]: Process killed: %s
[PROC]: Process killed: %s
[PROC]: Failed to terminate process: %s
[PROC]: Failed to terminate process: %s
[PROC]: Process killed ID: %s
[PROC]: Process killed ID: %s
[PROC]: Failed to terminate process ID: %s
[PROC]: Failed to terminate process ID: %s
[FILE]: Deleted '%s'.
[FILE]: Deleted '%s'.
[VISIT]: URL: %s.
[VISIT]: URL: %s.
[VISIT]: Failed to start connection thread, error: .
[VISIT]: Failed to start connection thread, error: .
mirccmd
mirccmd
[PSNIFF]: Failed to start sniffer thread, error: .
[PSNIFF]: Failed to start sniffer thread, error: .
[PSNIFF]: Carnivore stopped. (%d thread(s) stopped.)
[PSNIFF]: Carnivore stopped. (%d thread(s) stopped.)
keylog
keylog
[KeyLog] Already running.
[KeyLog] Already running.
[KeyLog] pay-sites keylogger active.
[KeyLog] pay-sites keylogger active.
[KeyLog] Normal key logger active.
[KeyLog] Normal key logger active.
[KeyLog] Unknow mode type.
[KeyLog] Unknow mode type.
[KeyLog] Failed to start logging thread, error: .
[KeyLog] Failed to start logging thread, error: .
[KeyLog] Missing mode type.
[KeyLog] Missing mode type.
Keylog
Keylog
[MAIN]: Unrecognized command: %s.
[MAIN]: Unrecognized command: %s.
privmsg
privmsg
ACTION %s
ACTION %s
MODE %s
MODE %s
%s %s %s :%s
%s %s %s :%s
[MAIN]: Repeat: %s
[MAIN]: Repeat: %s
[MAIN]: Repeat not allowed in command line: %s
[MAIN]: Repeat not allowed in command line: %s
%s%s.exe
%s%s.exe
[UPDATE]: Downloading update from: %s.
[UPDATE]: Downloading update from: %s.
[UPDATE]: Failed to start download thread, error: .
[UPDATE]: Failed to start download thread, error: .
[EXEC]: Couldn't execute file.
[EXEC]: Couldn't execute file.
[EXEC]: Commands: %s
[EXEC]: Commands: %s
[FILE]: Rename: '%s' to: '%s'.
[FILE]: Rename: '%s' to: '%s'.
[ICMP]: Flooding: (%s) for %s seconds.
[ICMP]: Flooding: (%s) for %s seconds.
[ICMP]: Failed to start flood thread, error: .
[ICMP]: Failed to start flood thread, error: .
utorrent.seed
utorrent.seed
[DOWNLOAD]: Downloading URL: %s to: %s.
[DOWNLOAD]: Downloading URL: %s to: %s.
[DOWNLOAD]: Failed to start transfer thread, error: .
[DOWNLOAD]: Failed to start transfer thread, error: .
helo $rndnick
helo $rndnick
mail from:
mail from:
rcpt to:
rcpt to:
subject: %s
subject: %s
from: %s
from: %s
[EMAIL]: Message sent to %s.
[EMAIL]: Message sent to %s.
PASS %s
PASS %s
USER %s 0 0 :%s
USER %s 0 0 :%s
[DOWNLOAD]: Couldn't open file for writing: %s.
[DOWNLOAD]: Couldn't open file for writing: %s.
[DOWNLOAD]: Filesize is incorrect. (Recevied: %d bytes, Expected: %d bytes.)
[DOWNLOAD]: Filesize is incorrect. (Recevied: %d bytes, Expected: %d bytes.)
[DOWNLOAD]: CRC32 is incorrect. (Local CRC32: %d, Expected CRC32: %d.)
[DOWNLOAD]: CRC32 is incorrect. (Local CRC32: %d, Expected CRC32: %d.)
[DOWNLOAD]: File download: %.1fKB to: %s @ %.1fKB/sec.
[DOWNLOAD]: File download: %.1fKB to: %s @ %.1fKB/sec.
[DOWNLOAD]: Opened: %s.
[DOWNLOAD]: Opened: %s.
[DOWNLOAD]: Update failed: Error executing file: %s.
[DOWNLOAD]: Update failed: Error executing file: %s.
[DOWNLOAD]: Bad URL or DNS Error: %s.
[DOWNLOAD]: Bad URL or DNS Error: %s.
\Program Files\Mozilla Firefox\MOZCRT19.dll
\Program Files\Mozilla Firefox\MOZCRT19.dll
\Program Files\Mozilla Firefox\sqlite3.dll
\Program Files\Mozilla Firefox\sqlite3.dll
\Program Files\Mozilla Firefox\nspr4.dll
\Program Files\Mozilla Firefox\nspr4.dll
\Program Files\Mozilla Firefox\plds4.dll
\Program Files\Mozilla Firefox\plds4.dll
\Program Files\Mozilla Firefox\plc4.dll
\Program Files\Mozilla Firefox\plc4.dll
\Program Files\Mozilla Firefox\nssutil3.dll
\Program Files\Mozilla Firefox\nssutil3.dll
Application Data\Mozilla\Firefox
Application Data\Mozilla\Firefox
\profiles.ini
\profiles.ini
SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command
SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command
nspr4.dll
nspr4.dll
plc4.dll
plc4.dll
plds4.dll
plds4.dll
softokn3.dll
softokn3.dll
nss3.dll
nss3.dll
PK11_GetInternalKeySlot
PK11_GetInternalKeySlot
PK11_CheckUserPassword
PK11_CheckUserPassword
/signons.txt
/signons.txt
/signons2.txt
/signons2.txt
/signons3.txt
/signons3.txt
[ICMP]: Error: socket() failed, returned: .
[ICMP]: Error: socket() failed, returned: .
[ICMP]: Error: setsockopt() failed, returned: .
[ICMP]: Error: setsockopt() failed, returned: .
[ICMP]: Error sending packets to IP: %s. Packets sent: %d. Returned: .
[ICMP]: Error sending packets to IP: %s. Packets sent: %d. Returned: .
[ICMP]: Done with %s flood to IP: %s. Sent: %d packet(s) @ %dKB/sec (%dMB).
[ICMP]: Done with %s flood to IP: %s. Sent: %d packet(s) @ %dKB/sec (%dMB).
PRIVMSG
PRIVMSG
%s %s :%s
%s %s :%s
Login - PayPal
Login - PayPal
moneybookers.com
moneybookers.com
AlertPay.com-My Way To Pay
AlertPay.com-My Way To Pay
Login: Step 1
Login: Step 1
h4cky0u.org
h4cky0u.org
Login
Login
Warez-BB.org :: Log in
Warez-BB.org :: Log in
DirectAdmin Login
DirectAdmin Login
Invision Power Services :: Invision Power Services : Login
Invision Power Services :: Invision Power Services : Login
Rapidshare-Premium.com - FREE Rapidshare Premium Link Generator
Rapidshare-Premium.com - FREE Rapidshare Premium Link Generator
Play.com (UK)
Play.com (UK)
Admin Login
Admin Login
Administrator Login
Administrator Login
amazon.com
amazon.com
MessengerFX.com - Web Messenger
MessengerFX.com - Web Messenger
ILoveIM.com Web Messenger
ILoveIM.com Web Messenger
Web and Mobile messenger everywhere - eBuddy former e-messenger
Web and Mobile messenger everywhere - eBuddy former e-messenger
meebo.com
meebo.com
Complete Web Solutions: domains, hosting, site builders and SSL.
Complete Web Solutions: domains, hosting, site builders and SSL.
[KeyLog] %s (%s)
[KeyLog] %s (%s)
[KeyLog] %s
[KeyLog] %s
[KeyLog] .
[KeyLog] .
. (Changed Windows: %s)
. (Changed Windows: %s)
. (Buffer full) (%s)
. (Buffer full) (%s)
. (Return) (%s)
. (Return) (%s)
kernel32.dll
kernel32.dll
ExitWindowsEx
ExitWindowsEx
GetAsyncKeyState
GetAsyncKeyState
GetKeyState
GetKeyState
advapi32.dll
advapi32.dll
RegOpenKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegCreateKeyExA
RegCloseKey
RegCloseKey
gdi32.dll
gdi32.dll
ws2_32.dll
ws2_32.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpSendRequestA
HttpSendRequestA
FtpGetFileA
FtpGetFileA
FtpPutFileA
FtpPutFileA
InternetOpenUrlA
InternetOpenUrlA
InternetCrackUrlA
InternetCrackUrlA
Mozilla/4.0 (compatible)
Mozilla/4.0 (compatible)
icmp.dll
icmp.dll
netapi32.dll
netapi32.dll
dnsapi.dll
dnsapi.dll
iphlpapi.dll
iphlpapi.dll
mpr.dll
mpr.dll
shell32.dll
shell32.dll
ShellExecuteA
ShellExecuteA
odbc32.dll
odbc32.dll
SQLDriverConnect
SQLDriverConnect
SQLSetEnvAttr
SQLSetEnvAttr
SQLExecDirect
SQLExecDirect
SQLAllocHandle
SQLAllocHandle
SQLFreeHandle
SQLFreeHandle
SQLDisconnect
SQLDisconnect
userenv.dll
userenv.dll
avicap32.dll
avicap32.dll
Kernel32.dll failed.
Kernel32.dll failed.
User32.dll failed.
User32.dll failed.
Advapi32.dll failed.
Advapi32.dll failed.
Gdi32.dll failed.
Gdi32.dll failed.
Ws2_32.dll failed.
Ws2_32.dll failed.
Wininet.dll failed.
Wininet.dll failed.
Icmp.dll failed.
Icmp.dll failed.
Netapi32.dll failed.
Netapi32.dll failed.
Dnsapi.dll failed.
Dnsapi.dll failed.
Iphlpapi.dll failed.
Iphlpapi.dll failed.
Mpr32.dll failed.
Mpr32.dll failed.
Shell32.dll failed.
Shell32.dll failed.
Odbc32.dll failed.
Odbc32.dll failed.
Avicap32.dll failed.
Avicap32.dll failed.
%s%s%s
%s%s%s
%s Error: %s .
%s Error: %s .
explorer.exe
explorer.exe
%s %s
%s %s
%sdel.bat
%sdel.bat
del "%s"
del "%s"
%%comspec%% /c %s %s
%%comspec%% /c %s %s
netsh.exe firewall add allowedprogram RIOTBOT.exe RIOTBOT ENABLE
netsh.exe firewall add allowedprogram RIOTBOT.exe RIOTBOT ENABLE
Software\Microsoft\Internet Explorer\New Windows
Software\Microsoft\Internet Explorer\New Windows
[Msn] Message sent to %d contacts!
[Msn] Message sent to %d contacts!
[FLUSHDNS]: Error getting ARP cache: .
[FLUSHDNS]: Error getting ARP cache: .
[FLUSHDNS]: Not supported by this system.
[FLUSHDNS]: Not supported by this system.
%d.%d.%d.%d
%d.%d.%d.%d
\Program Files\eDonkey2000\incoming
\Program Files\eDonkey2000\incoming
WinExec
WinExec
AVPCC.EXE
AVPCC.EXE
ACKWIN32.EXE
ACKWIN32.EXE
ADAWARE.EXE
ADAWARE.EXE
ADVXDWIN.EXE
ADVXDWIN.EXE
AGENTSVR.EXE
AGENTSVR.EXE
AGENTW.EXE
AGENTW.EXE
ALERTSVC.EXE
ALERTSVC.EXE
ALEVIR.EXE
ALEVIR.EXE
ALOGSERV.EXE
ALOGSERV.EXE
AMON9X.EXE
AMON9X.EXE
ANTI-TROJAN.EXE
ANTI-TROJAN.EXE
ANTIVIRUS.EXE
ANTIVIRUS.EXE
ANTS.EXE
ANTS.EXE
APIMONITOR.EXE
APIMONITOR.EXE
APLICA32.EXE
APLICA32.EXE
APVXDWIN.EXE
APVXDWIN.EXE
ARR.EXE
ARR.EXE
ATCON.EXE
ATCON.EXE
ATGUARD.EXE
ATGUARD.EXE
ATRO55EN.EXE
ATRO55EN.EXE
ATUPDATER.EXE
ATUPDATER.EXE
ATWATCH.EXE
ATWATCH.EXE
AU.EXE
AU.EXE
AUPDATE.EXE
AUPDATE.EXE
AUTODOWN.EXE
AUTODOWN.EXE
AUTOTRACE.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
AUTOUPDATE.EXE
AVCONSOL.EXE
AVCONSOL.EXE
AVE32.EXE
AVE32.EXE
AVGCC32.EXE
AVGCC32.EXE
AVGCTRL.EXE
AVGCTRL.EXE
AVGNT.EXE
AVGNT.EXE
AVGSERV.EXE
AVGSERV.EXE
AVGSERV9.EXE
AVGSERV9.EXE
AVGUARD.EXE
AVGUARD.EXE
AVGW.EXE
AVGW.EXE
AVKPOP.EXE
AVKPOP.EXE
AVKSERV.EXE
AVKSERV.EXE
AVKSERVICE.EXE
AVKSERVICE.EXE
AVKWCTl9.EXE
AVKWCTl9.EXE
AVLTMAIN.EXE
AVLTMAIN.EXE
AVNT.EXE
AVNT.EXE
AVP.EXE
AVP.EXE
AVP32.EXE
AVP32.EXE
AVPDOS32.EXE
AVPDOS32.EXE
AVPM.EXE
AVPM.EXE
AVPTC32.EXE
AVPTC32.EXE
AVPUPD.EXE
AVPUPD.EXE
AVSCHED32.EXE
AVSCHED32.EXE
AVSYNMGR.EXE
AVSYNMGR.EXE
AVWIN95.EXE
AVWIN95.EXE
AVWINNT.EXE
AVWINNT.EXE
AVWUPD.EXE
AVWUPD.EXE
AVWUPD32.EXE
AVWUPD32.EXE
AVWUPSRV.EXE
AVWUPSRV.EXE
AVXMONITOR9X.EXE
AVXMONITOR9X.EXE
AVXMONITORNT.EXE
AVXMONITORNT.EXE
AVXQUAR.EXE
AVXQUAR.EXE
BACKWEB.EXE
BACKWEB.EXE
BARGAINS.EXE
BARGAINS.EXE
BD_PROFESSIONAL.EXE
BD_PROFESSIONAL.EXE
BEAGLE.EXE
BEAGLE.EXE
BELT.EXE
BELT.EXE
BIDEF.EXE
BIDEF.EXE
BIDSERVER.EXE
BIDSERVER.EXE
BIPCP.EXE
BIPCP.EXE
BIPCPEVALSETUP.EXE
BIPCPEVALSETUP.EXE
BISP.EXE
BISP.EXE
BLACKD.EXE
BLACKD.EXE
BLACKICE.EXE
BLACKICE.EXE
BLSS.EXE
BLSS.EXE
BOOTCONF.EXE
BOOTCONF.EXE
BOOTWARN.EXE
BOOTWARN.EXE
BORG2.EXE
BORG2.EXE
BPC.EXE
BPC.EXE
BRASIL.EXE
BRASIL.EXE
BS120.EXE
BS120.EXE
BUNDLE.EXE
BUNDLE.EXE
BVT.EXE
BVT.EXE
CCEVTMGR.EXECSINJECT.EXE
CCEVTMGR.EXECSINJECT.EXE
CCAPP.EXE
CCAPP.EXE
CCEVTMGR.EXE
CCEVTMGR.EXE
CCPXYSVC.EXE
CCPXYSVC.EXE
CDP.EXE
CDP.EXE
CFD.EXE
CFD.EXE
CFGWIZ.EXE
CFGWIZ.EXE
CFIADMIN.EXE
CFIADMIN.EXE
CFIAUDIT.EXE
CFIAUDIT.EXE
CFINET.EXE
CFINET.EXE
CFINET32.EXE
CFINET32.EXE
CLAW95CF.EXE
CLAW95CF.EXE
CLEAN.EXE
CLEAN.EXE
CLEANER.EXE
CLEANER.EXE
CLEANER3.EXE
CLEANER3.EXE
CLEANPC.EXE
CLEANPC.EXE
CLICK.EXE
CLICK.EXE
CMD32.EXE
CMD32.EXE
CMESYS.EXE
CMESYS.EXE
CMGRDIAN.EXE
CMGRDIAN.EXE
CMON016.EXE
CMON016.EXE
CONNECTIONMONITOR.EXE
CONNECTIONMONITOR.EXE
CPD.EXE
CPD.EXE
CPF9X206.EXE
CPF9X206.EXE
CPFNT206.EXE
CPFNT206.EXE
CTRL.EXE
CTRL.EXE
CV.EXE
CV.EXE
CWNB181.EXE
CWNB181.EXE
CWNTDWMO.EXE
CWNTDWMO.EXE
Claw95.EXE
Claw95.EXE
DATEMANAGER.EXE
DATEMANAGER.EXE
DCOMX.EXE
DCOMX.EXE
DEFALERT.EXE
DEFALERT.EXE
DEFSCANGUI.EXE
DEFSCANGUI.EXE
DEFWATCH.EXE
DEFWATCH.EXE
DEPUTY.EXE
DEPUTY.EXE
DIVX.EXE
DIVX.EXE
DLLCACHE.EXE
DLLCACHE.EXE
DLLREG.EXE
DLLREG.EXE
DOORS.EXE
DOORS.EXE
DPF.EXE
DPF.EXE
DPFSETUP.EXE
DPFSETUP.EXE
DPPS2.EXE
DPPS2.EXE
DRWATSON.EXE
DRWATSON.EXE
DRWEB32.EXE
DRWEB32.EXE
DRWEBUPW.EXE
DRWEBUPW.EXE
DSSAGENT.EXE
DSSAGENT.EXE
DVP95.EXE
DVP95.EXE
DVP95_0.EXE
DVP95_0.EXE
ECENGINE.EXE
ECENGINE.EXE
EFPEADM.EXE
EFPEADM.EXE
EMSW.EXE
EMSW.EXE
ENT.EXE
ENT.EXE
ESAFE.EXE
ESAFE.EXE
ESCANH95.EXE
ESCANH95.EXE
ESCANHNT.EXE
ESCANHNT.EXE
ESCANV95.EXE
ESCANV95.EXE
ESPWATCH.EXE
ESPWATCH.EXE
ETHEREAL.EXE
ETHEREAL.EXE
ETRUSTCIPE.EXE
ETRUSTCIPE.EXE
EVPN.EXE
EVPN.EXE
EXANTIVIRUS-CNET.EXE
EXANTIVIRUS-CNET.EXE
EXE.AVXW.EXE
EXE.AVXW.EXE
EXPERT.EXE
EXPERT.EXE
EXPLORE.EXE
EXPLORE.EXE
F-RBOT.EXE
F-RBOT.EXE
F-SDBOT.EXE
F-SDBOT.EXE
F-SPYBOT.EXE
F-SPYBOT.EXE
F-AGOBOT.EXE
F-AGOBOT.EXE
F-RXBOT.EXE
F-RXBOT.EXE
F-AV.EXE
F-AV.EXE
F-PHATBOT.EXE
F-PHATBOT.EXE
F-FW.EXE
F-FW.EXE
F-AGNT95.EXE
F-AGNT95.EXE
F-PROT.EXE
F-PROT.EXE
F-PROT95.EXE
F-PROT95.EXE
F-STOPW.EXE
F-STOPW.EXE
FAMEH32.EXE
FAMEH32.EXE
FAST.EXE
FAST.EXE
FCH32.EXE
FCH32.EXE
FIH32.EXE
FIH32.EXE
FINDVIRU.EXE
FINDVIRU.EXE
FIREWALL.EXE
FIREWALL.EXE
FLOWPROTECTOR.EXE
FLOWPROTECTOR.EXE
FNRB32.EXE
FNRB32.EXE
FP-WIN.EXE
FP-WIN.EXE
FP-WIN_TRIAL.EXE
FP-WIN_TRIAL.EXE
FPROT.EXE
FPROT.EXE
FRW.EXE
FRW.EXE
FSAA.EXE
FSAA.EXE
FSAV.EXE
FSAV.EXE
FSAV32.EXE
FSAV32.EXE
FSAV530STBYB.EXE
FSAV530STBYB.EXE
FSAV530WTBYB.EXE
FSAV530WTBYB.EXE
FSAV95.EXE
FSAV95.EXE
FSGK32.EXE
FSGK32.EXE
FSM32.EXE
FSM32.EXE
FSMA32.EXE
FSMA32.EXE
FSMB32.EXE
FSMB32.EXE
GATOR.EXE
GATOR.EXE
GBMENU.EXE
GBMENU.EXE
GBPOLL.EXE
GBPOLL.EXE
GENERICS.EXE
GENERICS.EXE
GMT.EXE
GMT.EXE
GUARD.EXE
GUARD.EXE
GUARDDOG.EXE
GUARDDOG.EXE
HIJACKTHIS.EXE
HIJACKTHIS.EXE
HACKTRACERSETUP.EXE
HACKTRACERSETUP.EXE
HBINST.EXE
HBINST.EXE
HBSRV.EXE
HBSRV.EXE
HOTACTIO.EXE
HOTACTIO.EXE
HOTPATCH.EXE
HOTPATCH.EXE
HTLOG.EXE
HTLOG.EXE
HTPATCH.EXE
HTPATCH.EXE
HWPE.EXE
HWPE.EXE
HXDL.EXE
HXDL.EXE
HXIUL.EXE
HXIUL.EXE
IAMAPP.EXE
IAMAPP.EXE
IAMSERV.EXE
IAMSERV.EXE
IAMSTATS.EXE
IAMSTATS.EXE
IBMASN.EXE
IBMASN.EXE
IBMAVSP.EXE
IBMAVSP.EXE
ICLOAD95.EXE
ICLOAD95.EXE
ICLOADNT.EXE
ICLOADNT.EXE
ICMON.EXE
ICMON.EXE
ICSUPP95.EXE
ICSUPP95.EXE
ICSUPPNT.EXE
ICSUPPNT.EXE
IDLE.EXE
IDLE.EXE
IEDLL.EXE
IEDLL.EXE
IEDRIVER.EXE
IEDRIVER.EXE
IEXPLORER.EXE
IEXPLORER.EXE
IFACE.EXE
IFACE.EXE
IFW2000.EXE
IFW2000.EXE
INETLNFO.EXE
INETLNFO.EXE
INFUS.EXE
INFUS.EXE
INFWIN.EXE
INFWIN.EXE
INIT.EXE
INIT.EXE
INTDEL.EXE
INTDEL.EXE
INTREN.EXE
INTREN.EXE
IOMON98.EXE
IOMON98.EXE
IPARMOR.EXE
IPARMOR.EXE
IRIS.EXE
IRIS.EXE
ISASS.EXE
ISASS.EXE
ISRV95.EXE
ISRV95.EXE
ISTSVC.EXE
ISTSVC.EXE
JAMMER.EXE
JAMMER.EXE
JDBGMRG.EXE
JDBGMRG.EXE
JEDI.EXE
JEDI.EXE
KAVLITE40ENG.EXE
KAVLITE40ENG.EXE
KAVPERS40ENG.EXE
KAVPERS40ENG.EXE
KAVPF.EXE
KAVPF.EXE
KEENVALUE.EXE
KEENVALUE.EXE
KERIO-PF-213-EN-WIN.EXE
KERIO-PF-213-EN-WIN.EXE
KERIO-WRL-421-EN-WIN.EXE
KERIO-WRL-421-EN-WIN.EXE
KERIO-WRP-421-EN-WIN.EXE
KERIO-WRP-421-EN-WIN.EXE
KERNEL32.EXE
KERNEL32.EXE
KILLPROCESSSETUP161.EXE
KILLPROCESSSETUP161.EXE
LAUNCHER.EXE
LAUNCHER.EXE
LDNETMON.EXE
LDNETMON.EXE
LDPRO.EXE
LDPRO.EXE
LDPROMENU.EXE
LDPROMENU.EXE
LDSCAN.EXE
LDSCAN.EXE
LNETINFO.EXE
LNETINFO.EXE
LOADER.EXE
LOADER.EXE
LOCALNET.EXE
LOCALNET.EXE
LOCKDOWN.EXE
LOCKDOWN.EXE
LOCKDOWN2000.EXE
LOCKDOWN2000.EXE
LOOKOUT.EXE
LOOKOUT.EXE
LORDPE.EXE
LORDPE.EXE
LSETUP.EXE
LSETUP.EXE
LUALL.EXE
LUALL.EXE
LUAU.EXE
LUAU.EXE
LUCOMSERVER.EXE
LUCOMSERVER.EXE
LUINIT.EXE
LUINIT.EXE
LUSPT.EXE
LUSPT.EXE
MAPISVC32.EXE
MAPISVC32.EXE
MCAGENT.EXE
MCAGENT.EXE
MCMNHDLR.EXE
MCMNHDLR.EXE
MCSHIELD.EXE
MCSHIELD.EXE
MCTOOL.EXE
MCTOOL.EXE
MCUPDATE.EXE
MCUPDATE.EXE
MCVSRTE.EXE
MCVSRTE.EXE
MCVSSHLD.EXE
MCVSSHLD.EXE
MD.EXE
MD.EXE
MFIN32.EXE
MFIN32.EXE
MFW2EN.EXE
MFW2EN.EXE
MFWENG3.02D30.EXE
MFWENG3.02D30.EXE
MGAVRTCL.EXE
MGAVRTCL.EXE
MGAVRTE.EXE
MGAVRTE.EXE
MGHTML.EXE
MGHTML.EXE
MGUI.EXE
MGUI.EXE
MINILOG.EXE
MINILOG.EXE
MMOD.EXE
MMOD.EXE
MONITOR.EXE
MONITOR.EXE
MOOLIVE.EXE
MOOLIVE.EXE
MOSTAT.EXE
MOSTAT.EXE
MPFAGENT.EXE
MPFAGENT.EXE
MPFSERVICE.EXE
MPFSERVICE.EXE
MPFTRAY.EXE
MPFTRAY.EXE
MRFLUX.EXE
MRFLUX.EXE
MSCONFIG.EXEMSAPP.EXE
MSCONFIG.EXEMSAPP.EXE
MSBB.EXE
MSBB.EXE
MSBLAST.EXE
MSBLAST.EXE
MSCACHE.EXE
MSCACHE.EXE
MSCCN32.EXE
MSCCN32.EXE
MSCMAN.EXE
MSCMAN.EXE
MSDM.EXE
MSDM.EXE
MSDOS.EXE
MSDOS.EXE
MSIEXEC16.EXE
MSIEXEC16.EXE
MSINFO32.EXE
MSINFO32.EXE
MSLAUGH.EXE
MSLAUGH.EXE
MSMGT.EXE
MSMGT.EXE
MSMSGRI32.EXE
MSMSGRI32.EXE
MSSMMC32.EXE
MSSMMC32.EXE
MSSYS.EXE
MSSYS.EXE
MSVXD.EXE
MSVXD.EXE
MU0311AD.EXE
MU0311AD.EXE
MWATCH.EXE
MWATCH.EXE
N32SCANW.EXE
N32SCANW.EXE
NAV.EXE
NAV.EXE
AUTO-PROTECT.NAV80TRY.EXE
AUTO-PROTECT.NAV80TRY.EXE
NAVAP.NAVAPSVC.EXE
NAVAP.NAVAPSVC.EXE
NAVAPSVC.EXE
NAVAPSVC.EXE
NAVAPW32.EXE
NAVAPW32.EXE
NAVDX.EXE
NAVDX.EXE
NAVENGNAVEX15.NAVLU32.EXE
NAVENGNAVEX15.NAVLU32.EXE
NAVLU32.EXE
NAVLU32.EXE
NAVNT.EXE
NAVNT.EXE
NAVSTUB.EXE
NAVSTUB.EXE
NAVW32.EXE
NAVW32.EXE
NAVWNT.EXE
NAVWNT.EXE
NC2000.EXE
NC2000.EXE
NCINST4.EXE
NCINST4.EXE
NDD32.EXE
NDD32.EXE
NEOMONITOR.EXE
NEOMONITOR.EXE
NEOWATCHLOG.EXE
NEOWATCHLOG.EXE
NETSTAT.EXE
NETSTAT.EXE
NETARMOR.EXE
NETARMOR.EXE
NETD32.EXE
NETD32.EXE
NETINFO.EXE
NETINFO.EXE
NETMON.EXE
NETMON.EXE
NETSCANPRO.EXE
NETSCANPRO.EXE
NETSPYHUNTER-1.2.EXE
NETSPYHUNTER-1.2.EXE
NETUTILS.EXE
NETUTILS.EXE
NISSERV.EXE
NISSERV.EXE
NISUM.EXE
NISUM.EXE
NMAIN.EXE
NMAIN.EXE
NOD32.EXE
NOD32.EXE
NORMIST.EXE
NORMIST.EXE
NORTON_INTERNET_SECU_3.0_407.EXE
NORTON_INTERNET_SECU_3.0_407.EXE
NOTSTART.EXE
NOTSTART.EXE
NPF40_TW_98_NT_ME_2K.EXE
NPF40_TW_98_NT_ME_2K.EXE
NPFMESSENGER.EXE
NPFMESSENGER.EXE
NPROTECT.EXE
NPROTECT.EXE
NPSCHECK.EXE
NPSCHECK.EXE
NPSSVC.EXE
NPSSVC.EXE
NSCHED32.EXE
NSCHED32.EXE
NSSYS32.EXE
NSSYS32.EXE
NSTASK32.EXE
NSTASK32.EXE
NSUPDATE.EXE
NSUPDATE.EXE
NT.EXE
NT.EXE
NTRTSCAN.EXE
NTRTSCAN.EXE
NTVDM.EXE
NTVDM.EXE
NTXconfig.EXE
NTXconfig.EXE
NUI.EXE
NUI.EXE
NUPGRADE.EXE
NUPGRADE.EXE
NVARCH16.EXE
NVARCH16.EXE
NVC95.EXE
NVC95.EXE
NVSVC32.EXE
NVSVC32.EXE
NWINST4.EXE
NWINST4.EXE
NWSERVICE.EXE
NWSERVICE.EXE
NWTOOL16.EXE
NWTOOL16.EXE
OGRC.EXE
OGRC.EXE
OLLYDBG.EXE
OLLYDBG.EXE
ONSRVR.EXE
ONSRVR.EXE
OPTIMIZE.EXE
OPTIMIZE.EXE
OSTRONET.EXE
OSTRONET.EXE
OTFIX.EXE
OTFIX.EXE
OUTPOST.EXE
OUTPOST.EXE
OUTPOSTINSTALL.EXE
OUTPOSTINSTALL.EXE
OUTPOSTPROINSTALL.EXE
OUTPOSTPROINSTALL.EXE
PADMIN.EXE
PADMIN.EXE
PANIXK.EXE
PANIXK.EXE
PATCH.EXE
PATCH.EXE
PAVCL.EXE
PAVCL.EXE
PAVPROXY.EXE
PAVPROXY.EXE
PAVSCHED.EXE
PAVSCHED.EXE
PAVW.EXE
PAVW.EXE
PCC2002S902.EXE
PCC2002S902.EXE
PCC2K_76_1436.EXE
PCC2K_76_1436.EXE
PCCIOMON.EXE
PCCIOMON.EXE
PCCNTMON.EXE
PCCNTMON.EXE
PCCWIN97.EXE
PCCWIN97.EXE
PCCWIN98.EXE
PCCWIN98.EXE
PCDSETUP.EXE
PCDSETUP.EXE
PCFWALLICON.EXE
PCFWALLICON.EXE
PCIP10117_0.EXE
PCIP10117_0.EXE
PCSCAN.EXE
PCSCAN.EXE
PDSETUP.EXE
PDSETUP.EXE
PENIS.EXE
PENIS.EXE
PERISCOPE.EXE
PERISCOPE.EXE
PERSFW.EXE
PERSFW.EXE
PERSWF.EXE
PERSWF.EXE
PF2.EXE
PF2.EXE
PFWADMIN.EXE
PFWADMIN.EXE
PGMONITR.EXE
PGMONITR.EXE
PINGSCAN.EXE
PINGSCAN.EXE
PLATIN.EXE
PLATIN.EXE
POP3TRAP.EXE
POP3TRAP.EXE
POPROXY.EXE
POPROXY.EXE
POPSCAN.EXE
POPSCAN.EXE
PORTDETECTIVE.EXE
PORTDETECTIVE.EXE
PORTMONITOR.EXE
PORTMONITOR.EXE
POWERSCAN.EXE
POWERSCAN.EXE
PPINUPDT.EXE
PPINUPDT.EXE
PPTBC.EXE
PPTBC.EXE
PPVSTOP.EXE
PPVSTOP.EXE
PRIZESURFER.EXE
PRIZESURFER.EXE
PRMT.EXE
PRMT.EXE
PRMVR.EXE
PRMVR.EXE
PROCDUMP.EXE
PROCDUMP.EXE
PROCESSMONITOR.EXE
PROCESSMONITOR.EXE
PROCEXPLORERV1.0.EXE
PROCEXPLORERV1.0.EXE
PROGRAMAUDITOR.EXE
PROGRAMAUDITOR.EXE
PROPORT.EXE
PROPORT.EXE
PROTECTX.EXE
PROTECTX.EXE
PSPF.EXE
PSPF.EXE
PURGE.EXE
PURGE.EXE
PUSSY.EXE
PUSSY.EXE
PVIEW95.EXE
PVIEW95.EXE
QDCSFS.EXE
QDCSFS.EXE
QCONSOLE.EXE
QCONSOLE.EXE
QSERVER.EXE
QSERVER.EXE
RAPAPP.EXE
RAPAPP.EXE
RAV7.EXE
RAV7.EXE
RAV7WIN.EXE
RAV7WIN.EXE
RAV8WIN32ENG.EXE
RAV8WIN32ENG.EXE
RAY.EXE
RAY.EXE
RB32.EXE
RB32.EXE
RCSYNC.EXE
RCSYNC.EXE
REALMON.EXE
REALMON.EXE
REGED.EXE
REGED.EXE
REGEDT32.EXE
REGEDT32.EXE
REGEDIT.EXE
REGEDIT.EXE
RESCUE.EXE
RESCUE.EXE
RESCUE32.EXE
RESCUE32.EXE
RRGUARD.EXE
RRGUARD.EXE
RSHELL.EXE
RSHELL.EXE
RTVSCAN.EXE
RTVSCAN.EXE
RTVSCN95.EXE
RTVSCN95.EXE
RULAUNCH.EXE
RULAUNCH.EXE
RUN32DLL.EXE
RUN32DLL.EXE
RUNDLL.EXE
RUNDLL.EXE
RUNDLL16.EXE
RUNDLL16.EXE
RUXDLL32.EXE
RUXDLL32.EXE
SBSERV.EXE
SBSERV.EXE
SYMTRAY.EXE
SYMTRAY.EXE
SAFEWEB.EXE
SAFEWEB.EXE
SAHAGENT.EXE
SAHAGENT.EXE
SAVE.EXE
SAVE.EXE
SAVENOW.EXE
SAVENOW.EXE
SC.EXE
SC.EXE
SCAM32.EXE
SCAM32.EXE
SCAN32.EXE
SCAN32.EXE
SCAN95.EXE
SCAN95.EXE
SCANPM.EXE
SCANPM.EXE
SCRSCAN.EXE
SCRSCAN.EXE
SCRSVR.EXE
SCRSVR.EXE
SCVHOST.EXE
SCVHOST.EXE
SD.EXE
SD.EXE
SERV95.EXE
SERV95.EXE
SERVICE.EXE
SERVICE.EXE
SERVLCE.EXE
SERVLCE.EXE
SERVLCES.EXE
SERVLCES.EXE
SETUPVAMEEVAL.EXE
SETUPVAMEEVAL.EXE
SETUP_FLOWPROTECTOR_US.EXE
SETUP_FLOWPROTECTOR_US.EXE
SFC.EXE
SFC.EXE
SGSSFW32.EXE
SGSSFW32.EXE
SH.EXE
SH.EXE
SHELLSPYINSTALL.EXE
SHELLSPYINSTALL.EXE
SHN.EXE
SHN.EXE
SHOWBEHIND.EXE
SHOWBEHIND.EXE
SMC.EXE
SMC.EXE
SMS.EXE
SMS.EXE
SMSS32.EXE
SMSS32.EXE
SOAP.EXE
SOAP.EXE
SOFI.EXE
SOFI.EXE
SPERM.EXE
SPERM.EXE
SPF.EXE
SPF.EXE
SPHINX.EXE
SPHINX.EXE
SPOLER.EXE
SPOLER.EXE
SPOOLCV.EXE
SPOOLCV.EXE
SPOOLSV32.EXE
SPOOLSV32.EXE
SPYXX.EXE
SPYXX.EXE
SREXE.EXE
SREXE.EXE
SRNG.EXE
SRNG.EXE
SS3EDIT.EXE
SS3EDIT.EXE
SSGRATE.EXE
SSGRATE.EXE
SSG_4104.EXE
SSG_4104.EXE
ST2.EXE
ST2.EXE
START.EXE
START.EXE
STCLOADER.EXE
STCLOADER.EXE
SUPFTRL.EXE
SUPFTRL.EXE
SUPPORT.EXE
SUPPORT.EXE
SUPPORTER5.EXE
SUPPORTER5.EXE
SVC.EXE
SVC.EXE
SVCHOSTC.EXE
SVCHOSTC.EXE
SVCHOSTS.EXE
SVCHOSTS.EXE
SVSHOST.EXE
SVSHOST.EXE
SWEEP95.EXE
SWEEP95.EXE
SWEEPNET.SWEEPSRV.SYS.SWNETSUP.EXE
SWEEPNET.SWEEPSRV.SYS.SWNETSUP.EXE
SYMPROXYSVC.EXE
SYMPROXYSVC.EXE
SYSEDIT.EXE
SYSEDIT.EXE
SYSTEM.EXE
SYSTEM.EXE
SYSTEM32.EXE
SYSTEM32.EXE
SYSUPD.EXE
SYSUPD.EXE
TASKMG.EXE
TASKMG.EXE
TASKMO.EXE
TASKMO.EXE
TAUMON.EXE
TAUMON.EXE
TBSCAN.EXE
TBSCAN.EXE
TC.EXE
TC.EXE
TCA.EXE
TCA.EXE
TCM.EXE
TCM.EXE
TDS-3.EXE
TDS-3.EXE
TDS2-98.EXE
TDS2-98.EXE
TDS2-NT.EXE
TDS2-NT.EXE
TEEKIDS.EXE
TEEKIDS.EXE
TFAK.EXE
TFAK.EXE
TFAK5.EXE
TFAK5.EXE
TGBOB.EXE
TGBOB.EXE
TITANIN.EXE
TITANIN.EXE
TITANINXP.EXE
TITANINXP.EXE
TRACERT.EXE
TRACERT.EXE
TRICKLER.EXE
TRICKLER.EXE
TRJSCAN.EXE
TRJSCAN.EXE
TRJSETUP.EXE
TRJSETUP.EXE
TROJANTRAP3.EXE
TROJANTRAP3.EXE
TSADBOT.EXE
TSADBOT.EXE
TVMD.EXE
TVMD.EXE
TVTMD.EXE
TVTMD.EXE
UNDOBOOT.EXE
UNDOBOOT.EXE
UPDAT.EXE
UPDAT.EXE
UPDATE.EXE
UPDATE.EXE
UPGRAD.EXE
UPGRAD.EXE
UTPOST.EXE
UTPOST.EXE
VFY.EXE
VFY.EXE
VBCMSERV.EXE
VBCMSERV.EXE
VBCONS.EXE
VBCONS.EXE
VBUST.EXE
VBUST.EXE
VBWIN9X.EXE
VBWIN9X.EXE
VBWINNTW.EXE
VBWINNTW.EXE
VCSETUP.EXE
VCSETUP.EXE
VET32.EXE
VET32.EXE
VET95.EXE
VET95.EXE
VETTRAY.EXE
VETTRAY.EXE
VFSETUP.EXE
VFSETUP.EXE
VIR-HELP.EXE
VIR-HELP.EXE
VIRUSMDPERSONALFIREWALL.EXE
VIRUSMDPERSONALFIREWALL.EXE
VNLAN300.EXE
VNLAN300.EXE
VNPC3000.EXE
VNPC3000.EXE
VPC32.EXE
VPC32.EXE
VPC42.EXE
VPC42.EXE
VPFW30S.EXE
VPFW30S.EXE
VPTRAY.EXE
VPTRAY.EXE
VSCAN40.EXE
VSCAN40.EXE
VSCENU6.02D30.EXE
VSCENU6.02D30.EXE
VSCHED.EXE
VSCHED.EXE
VSECOMR.EXE
VSECOMR.EXE
VSHWIN32.EXE
VSHWIN32.EXE
VSISETUP.EXE
VSISETUP.EXE
VSMAIN.EXE
VSMAIN.EXE
VSMON.EXE
VSMON.EXE
VSSTAT.EXE
VSSTAT.EXE
VSWIN9XE.EXE
VSWIN9XE.EXE
VSWINNTSE.EXE
VSWINNTSE.EXE
VSWINPERSE.EXE
VSWINPERSE.EXE
W32DSM89.EXE
W32DSM89.EXE
W9X.EXE
W9X.EXE
WATCHDOG.EXE
WATCHDOG.EXE
WEBDAV.EXE
WEBDAV.EXE
WEBSCANX.EXE
WEBSCANX.EXE
WEBTRAP.EXE
WEBTRAP.EXE
WFINDV32.EXE
WFINDV32.EXE
WGFE95.EXE
WGFE95.EXE
WHOSWATCHINGME.EXE
WHOSWATCHINGME.EXE
WIMMUN32.EXE
WIMMUN32.EXE
WIN-BUGSFIX.EXE
WIN-BUGSFIX.EXE
WIN32.EXE
WIN32.EXE
WIN32US.EXE
WIN32US.EXE
WINACTIVE.EXE
WINACTIVE.EXE
WINDOW.EXE
WINDOW.EXE
WINDOWS.EXE
WINDOWS.EXE
WININETD.EXE
WININETD.EXE
WININIT.EXE
WININIT.EXE
WININITX.EXE
WININITX.EXE
WINLOGIN.EXE
WINLOGIN.EXE
WINMAIN.EXE
WINMAIN.EXE
WINNET.EXE
WINNET.EXE
WINPPR32.EXE
WINPPR32.EXE
WINRECON.EXE
WINRECON.EXE
WINSERVN.EXE
WINSERVN.EXE
WINSSK32.EXE
WINSSK32.EXE
WINSTART.EXE
WINSTART.EXE
WINSTART001.EXE
WINSTART001.EXE
WINTSK32.EXE
WINTSK32.EXE
WINUPDATE.EXE
WINUPDATE.EXE
WKUFIND.EXE
WKUFIND.EXE
WNAD.EXE
WNAD.EXE
WNT.EXE
WNT.EXE
WRADMIN.EXE
WRADMIN.EXE
WRCTRL.EXE
WRCTRL.EXE
WSBGATE.EXE
WSBGATE.EXE
WUPDATER.EXE
WUPDATER.EXE
WUPDT.EXE
WUPDT.EXE
WYVERNWORKSFIREWALL.EXE
WYVERNWORKSFIREWALL.EXE
XPF202EN.EXE
XPF202EN.EXE
ZAPRO.EXE
ZAPRO.EXE
ZAPSETUP3001.EXE
ZAPSETUP3001.EXE
ZATUTOR.EXE
ZATUTOR.EXE
ZONALM2601.EXE
ZONALM2601.EXE
ZONEALARM.EXE
ZONEALARM.EXE
_AVP32.EXE
_AVP32.EXE
_AVPCC.EXE
_AVPCC.EXE
_AVPM.EXE
_AVPM.EXE
%s (%d)
%s (%d)
PONG %s
PONG %s
NOTICE %s :
NOTICE %s :
VERSION %s
VERSION %s
PING %s
PING %s
[MAIN]: User: %s logged out.
[MAIN]: User: %s logged out.
NOTICE %s :%s
NOTICE %s :%s
NICK
NICK
[MAIN]: Master: %s changed identity to: .
[MAIN]: Master: %s changed identity to: .
:%s%s
:%s%s
[MAIN]: Failed to change nick for Master: %s.
[MAIN]: Failed to change nick for Master: %s.
USERHOST %s
USERHOST %s
MODE %s %s
MODE %s %s
:.login
:.login
JOIN #
JOIN #
NICK
NICK
now an IRC Operator
now an IRC Operator
Password
Password
password
password
PASSWORD
PASSWORD
login
login
Login
Login
LOGIN
LOGIN
Login
Login
LOGIN
LOGIN
login
login
PASSWORD
PASSWORD
password
password
paypal.com
paypal.com
e-gold.com
e-gold.com
alertpay.com
alertpay.com
ebay.com
ebay.com
americabank.com
americabank.com
[PSNIFF]: Error: socket() failed, returned: .
[PSNIFF]: Error: socket() failed, returned: .
[PSNIFF]: Error: bind() failed, returned: .
[PSNIFF]: Error: bind() failed, returned: .
[PSNIFF]: Error: WSAIoctl() failed, returned: .
[PSNIFF]: Error: WSAIoctl() failed, returned: .
[PSNIFF]: Error: recv() failed, returned:
[PSNIFF]: Error: recv() failed, returned:
[PSNIFF]: Suspicious %s packet from: %s:%d to: %s:%d - %s
[PSNIFF]: Suspicious %s packet from: %s:%d to: %s:%d - %s
pstorec.dll
pstorec.dll
-=PSTORE=- %s %s:%s
-=PSTORE=- %s %s:%s
http:/
http:/
https:/
https:/
superbotijos.zapto.org
superbotijos.zapto.org
superbotijos2.zapto.org
superbotijos2.zapto.org
service.exe
service.exe
servicex.log
servicex.log
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunServices
Software\Microsoft\Windows\CurrentVersion\RunServices
password1
password1
passwd
passwd
pass1234
pass1234
1234567
1234567
12345678
12345678
123456789
123456789
1234567890
1234567890
12345678910
12345678910
windows
windows
loginpass
loginpass
domainpass
domainpass
domainpassword
domainpassword
dbpass
dbpass
dbpassword
dbpassword
databasepass
databasepass
databasepassword
databasepassword
sqlpassoainstall
sqlpassoainstall
winpass
winpass
%s %d "%s"
%s %d "%s"
[%s]|
[%s]|
[%d]%s
[%d]%s
%d. %s
%d. %s
%s: %s stopped. (%d thread(s) stopped.)
%s: %s stopped. (%d thread(s) stopped.)
%s: No %s thread found.
%s: No %s thread found.
\Desktop.ini
\Desktop.ini
[.ShellClassInfo]
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
icon=%SystemRoot%\system32\SHELL32.dll,4
icon=%SystemRoot%\system32\SHELL32.dll,4
\autorun.inf
\autorun.inf
[VISIT]: Invalid URL.
[VISIT]: Invalid URL.
[VISIT]: Failed to connect to HTTP server.
[VISIT]: Failed to connect to HTTP server.
[VISIT]: URL visited.
[VISIT]: URL visited.
[VISIT]: Failed to get requested URL from HTTP server.
[VISIT]: Failed to get requested URL from HTTP server.
zcÃ
zcÃ
%System%\service.exe
%System%\service.exe
EnumWindows
EnumWindows
keybd_event
keybd_event
VkKeyScanA
VkKeyScanA
USER32.dll
USER32.dll
ole32.dll
ole32.dll
OLEAUT32.dll
OLEAUT32.dll
URLDownloadToFileA
URLDownloadToFileA
urlmon.dll
urlmon.dll
GetCPInfo
GetCPInfo
KERNEL32.dll
KERNEL32.dll
6 6/6?6~6
6 6/6?6~6
8-9}9
8-9}9
2-2R2x2}2
2-2R2x2}2
:";(;,;0;4;
:";(;,;0;4;
? ?4???[?
? ?4???[?
6 6$6(6,6064686
6 6$6(6,6064686
7074787
7074787
: :$:(:,:0:4:8:<:>
: :$:(:,:0:4:8:<:>
service.exe_496_rwx_00400000_00097000:
.text
.text
`.rdata
`.rdata
@.data
@.data
.idata
.idata
.rsrc
.rsrc
@.reloc
@.reloc
Invalid allocation size: %u bytes.
Invalid allocation size: %u bytes.
Client hook allocation failure at file %hs line %d.
Client hook allocation failure at file %hs line %d.
_CrtCheckMemory()
_CrtCheckMemory()
_CrtIsValidHeapPointer(pUserData)
_CrtIsValidHeapPointer(pUserData)
Allocation too large or negative: %u bytes.
Allocation too large or negative: %u bytes.
Client hook re-allocation failure at file %hs line %d.
Client hook re-allocation failure at file %hs line %d.
DAMAGE: after %hs block (#%d) at 0xX.
DAMAGE: after %hs block (#%d) at 0xX.
DAMAGE: before %hs block (#%d) at 0xX.
DAMAGE: before %hs block (#%d) at 0xX.
memory check error at 0xX = 0xX, should be 0xX.
memory check error at 0xX = 0xX, should be 0xX.
%hs located at 0xX is %u bytes long.
%hs located at 0xX is %u bytes long.
%hs allocated at file %hs(%d).
%hs allocated at file %hs(%d).
DAMAGE: on top of Free block at 0xX.
DAMAGE: on top of Free block at 0xX.
Bad memory block found at 0xX.
Bad memory block found at 0xX.
_CrtMemCheckPoint: NULL state pointer.
_CrtMemCheckPoint: NULL state pointer.
_CrtMemDifference: NULL state pointer.
_CrtMemDifference: NULL state pointer.
crt block at 0xX, subtype %x, %u bytes long.
crt block at 0xX, subtype %x, %u bytes long.
normal block at 0xX, %u bytes long.
normal block at 0xX, %u bytes long.
client block at 0xX, subtype %x, %u bytes long.
client block at 0xX, subtype %x, %u bytes long.
%hs(%d) :
%hs(%d) :
#File Error#(%d) :
#File Error#(%d) :
Data: %s
Data: %s
%s(%d) : %s
%s(%d) : %s
_CrtDbgReport: String too long or IO Error
_CrtDbgReport: String too long or IO Error
Second Chance Assertion Failed: File %s, Line %d
Second Chance Assertion Failed: File %s, Line %d
user32.dll
user32.dll
Debug %s!
Debug %s!
Program: %s%s%s%s%s%s%s%s%s%s%s
Program: %s%s%s%s%s%s%s%s%s%s%s
portuguese-brazilian
portuguese-brazilian
VVV.symantec.com
VVV.symantec.com
127.0.0.1
127.0.0.1
securityresponse.symantec.com
securityresponse.symantec.com
symantec.com
symantec.com
VVV.sophos.com
VVV.sophos.com
sophos.com
sophos.com
VVV.mcafee.com
VVV.mcafee.com
mcafee.com
mcafee.com
liveupdate.symantecliveupdate.com
liveupdate.symantecliveupdate.com
VVV.viruslist.com
VVV.viruslist.com
viruslist.com
viruslist.com
f-secure.com
f-secure.com
VVV.f-secure.com
VVV.f-secure.com
kaspersky.com
kaspersky.com
kaspersky-labs.com
kaspersky-labs.com
VVV.avp.com
VVV.avp.com
VVV.kaspersky.com
VVV.kaspersky.com
avp.com
avp.com
VVV.networkassociates.com
VVV.networkassociates.com
networkassociates.com
networkassociates.com
VVV.ca.com
VVV.ca.com
ca.com
ca.com
mast.mcafee.com
mast.mcafee.com
my-etrust.com
my-etrust.com
VVV.my-etrust.com
VVV.my-etrust.com
download.mcafee.com
download.mcafee.com
dispatch.mcafee.com
dispatch.mcafee.com
secure.nai.com
secure.nai.com
nai.com
nai.com
VVV.nai.com
VVV.nai.com
update.symantec.com
update.symantec.com
updates.symantec.com
updates.symantec.com
us.mcafee.com
us.mcafee.com
liveupdate.symantec.com
liveupdate.symantec.com
customer.symantec.com
customer.symantec.com
rads.mcafee.com
rads.mcafee.com
trendmicro.com
trendmicro.com
VVV.trendmicro.com
VVV.trendmicro.com
VVV.grisoft.com
VVV.grisoft.com
CDKey
CDKey
prvkey
prvkey
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
Microsoft Windows Product ID
Microsoft Windows Product ID
codkey
codkey
Software\Electronic Arts\EA GAMES\Global Operations\ergc
Software\Electronic Arts\EA GAMES\Global Operations\ergc
Global Operations
Global Operations
Software\Electronic Arts\EA Sports\FIFA 2002\ergc
Software\Electronic Arts\EA Sports\FIFA 2002\ergc
Software\Electronic Arts\EA Sports\FIFA 2003\ergc
Software\Electronic Arts\EA Sports\FIFA 2003\ergc
Software\Electronic Arts\EA Sports\FIFA 2006\ergc
Software\Electronic Arts\EA Sports\FIFA 2006\ergc
Software\Electronic Arts\EA Sports\NHL 2002\ergc
Software\Electronic Arts\EA Sports\NHL 2002\ergc
Software\Electronic Arts\EA Sports\NHL 2003\ergc
Software\Electronic Arts\EA Sports\NHL 2003\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2002\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2002\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2003\ergc
Software\Electronic Arts\EA Sports\Nascar Racing 2003\ergc
Software\Techland\Chrome
Software\Techland\Chrome
Chrome
Chrome
base\mp\sof2key
base\mp\sof2key
nwncdkey.ini
nwncdkey.ini
Key1=
Key1=
Key2=
Key2=
Key3=
Key3=
KeyCode
KeyCode
3DMark06 Key
3DMark06 Key
Password
Password
Nod32 Pass
Nod32 Pass
%s\%s
%s\%s
%s CD Key: (%s).
%s CD Key: (%s).
NOTICE %s :Authentication failed (%s!%s).
NOTICE %s :Authentication failed (%s!%s).
NOTICE %s :Your attempt has been logged.
NOTICE %s :Your attempt has been logged.
[MAIN]: Password accepted.
[MAIN]: Password accepted.
[MAIN]: Failed to login user: %s, too many logins already.
[MAIN]: Failed to login user: %s, too many logins already.
$rndnick
$rndnick
rndnick
rndnick
NICK %s
NICK %s
[MAIN]: Random nick change to: %s.
[MAIN]: Random nick change to: %s.
QUIT :%s
QUIT :%s
[THREADS]: Failed to start list thread, error: .
[THREADS]: Failed to start list thread, error: .
[PROCS]: Failed to start listing thread, error: .
[PROCS]: Failed to start listing thread, error: .
cdkeys
cdkeys
[CDKEYS]: Search completed.
[CDKEYS]: Search completed.
.::[ PassStore Executed ]::.
.::[ PassStore Executed ]::.
firefox
firefox
FireFox
FireFox
FireFox Executed.
FireFox Executed.
firefoxstop
firefoxstop
Firefox
Firefox
[FLUSHDNS]: Failed to load dnsapi.dll.
[FLUSHDNS]: Failed to load dnsapi.dll.
nick
nick
join
join
JOIN %s %s
JOIN %s %s
PART %s
PART %s
[MAIN]: Sent IRC Raw: %s.
[MAIN]: Sent IRC Raw: %s.
[THREADS]: Stopped: %d thread(s).
[THREADS]: Stopped: %d thread(s).
[THREADS]: Killed thread: %s.
[THREADS]: Killed thread: %s.
[THREADS]: Failed to kill thread: %s.
[THREADS]: Failed to kill thread: %s.
[MAIN]: Prefix changed to: '%c'.
[MAIN]: Prefix changed to: '%c'.
[SHELL]: File opened: %s
[SHELL]: File opened: %s
[SHELL]: Couldn't open file: %s
[SHELL]: Couldn't open file: %s
[MAIN]: Server changed to: '%s'.
[MAIN]: Server changed to: '%s'.
[DNS]: Lookup: %s -> %s.
[DNS]: Lookup: %s -> %s.
[PROC]: Process killed: %s
[PROC]: Process killed: %s
[PROC]: Failed to terminate process: %s
[PROC]: Failed to terminate process: %s
[PROC]: Process killed ID: %s
[PROC]: Process killed ID: %s
[PROC]: Failed to terminate process ID: %s
[PROC]: Failed to terminate process ID: %s
[FILE]: Deleted '%s'.
[FILE]: Deleted '%s'.
[VISIT]: URL: %s.
[VISIT]: URL: %s.
[VISIT]: Failed to start connection thread, error: .
[VISIT]: Failed to start connection thread, error: .
mirccmd
mirccmd
[PSNIFF]: Failed to start sniffer thread, error: .
[PSNIFF]: Failed to start sniffer thread, error: .
[PSNIFF]: Carnivore stopped. (%d thread(s) stopped.)
[PSNIFF]: Carnivore stopped. (%d thread(s) stopped.)
keylog
keylog
[KeyLog] Already running.
[KeyLog] Already running.
[KeyLog] pay-sites keylogger active.
[KeyLog] pay-sites keylogger active.
[KeyLog] Normal key logger active.
[KeyLog] Normal key logger active.
[KeyLog] Unknow mode type.
[KeyLog] Unknow mode type.
[KeyLog] Failed to start logging thread, error: .
[KeyLog] Failed to start logging thread, error: .
[KeyLog] Missing mode type.
[KeyLog] Missing mode type.
Keylog
Keylog
[MAIN]: Unrecognized command: %s.
[MAIN]: Unrecognized command: %s.
privmsg
privmsg
ACTION %s
ACTION %s
MODE %s
MODE %s
%s %s %s :%s
%s %s %s :%s
[MAIN]: Repeat: %s
[MAIN]: Repeat: %s
[MAIN]: Repeat not allowed in command line: %s
[MAIN]: Repeat not allowed in command line: %s
%s%s.exe
%s%s.exe
[UPDATE]: Downloading update from: %s.
[UPDATE]: Downloading update from: %s.
[UPDATE]: Failed to start download thread, error: .
[UPDATE]: Failed to start download thread, error: .
[EXEC]: Couldn't execute file.
[EXEC]: Couldn't execute file.
[EXEC]: Commands: %s
[EXEC]: Commands: %s
[FILE]: Rename: '%s' to: '%s'.
[FILE]: Rename: '%s' to: '%s'.
[ICMP]: Flooding: (%s) for %s seconds.
[ICMP]: Flooding: (%s) for %s seconds.
[ICMP]: Failed to start flood thread, error: .
[ICMP]: Failed to start flood thread, error: .
utorrent.seed
utorrent.seed
[DOWNLOAD]: Downloading URL: %s to: %s.
[DOWNLOAD]: Downloading URL: %s to: %s.
[DOWNLOAD]: Failed to start transfer thread, error: .
[DOWNLOAD]: Failed to start transfer thread, error: .
helo $rndnick
helo $rndnick
mail from:
mail from:
rcpt to:
rcpt to:
subject: %s
subject: %s
from: %s
from: %s
[EMAIL]: Message sent to %s.
[EMAIL]: Message sent to %s.
PASS %s
PASS %s
USER %s 0 0 :%s
USER %s 0 0 :%s
[DOWNLOAD]: Couldn't open file for writing: %s.
[DOWNLOAD]: Couldn't open file for writing: %s.
[DOWNLOAD]: Filesize is incorrect. (Recevied: %d bytes, Expected: %d bytes.)
[DOWNLOAD]: Filesize is incorrect. (Recevied: %d bytes, Expected: %d bytes.)
[DOWNLOAD]: CRC32 is incorrect. (Local CRC32: %d, Expected CRC32: %d.)
[DOWNLOAD]: CRC32 is incorrect. (Local CRC32: %d, Expected CRC32: %d.)
[DOWNLOAD]: File download: %.1fKB to: %s @ %.1fKB/sec.
[DOWNLOAD]: File download: %.1fKB to: %s @ %.1fKB/sec.
[DOWNLOAD]: Opened: %s.
[DOWNLOAD]: Opened: %s.
[DOWNLOAD]: Update failed: Error executing file: %s.
[DOWNLOAD]: Update failed: Error executing file: %s.
[DOWNLOAD]: Bad URL or DNS Error: %s.
[DOWNLOAD]: Bad URL or DNS Error: %s.
\Program Files\Mozilla Firefox\MOZCRT19.dll
\Program Files\Mozilla Firefox\MOZCRT19.dll
\Program Files\Mozilla Firefox\sqlite3.dll
\Program Files\Mozilla Firefox\sqlite3.dll
\Program Files\Mozilla Firefox\nspr4.dll
\Program Files\Mozilla Firefox\nspr4.dll
\Program Files\Mozilla Firefox\plds4.dll
\Program Files\Mozilla Firefox\plds4.dll
\Program Files\Mozilla Firefox\plc4.dll
\Program Files\Mozilla Firefox\plc4.dll
\Program Files\Mozilla Firefox\nssutil3.dll
\Program Files\Mozilla Firefox\nssutil3.dll
Application Data\Mozilla\Firefox
Application Data\Mozilla\Firefox
\profiles.ini
\profiles.ini
SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command
SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command
nspr4.dll
nspr4.dll
plc4.dll
plc4.dll
plds4.dll
plds4.dll
softokn3.dll
softokn3.dll
nss3.dll
nss3.dll
PK11_GetInternalKeySlot
PK11_GetInternalKeySlot
PK11_CheckUserPassword
PK11_CheckUserPassword
/signons.txt
/signons.txt
/signons2.txt
/signons2.txt
/signons3.txt
/signons3.txt
[ICMP]: Error: socket() failed, returned: .
[ICMP]: Error: socket() failed, returned: .
[ICMP]: Error: setsockopt() failed, returned: .
[ICMP]: Error: setsockopt() failed, returned: .
[ICMP]: Error sending packets to IP: %s. Packets sent: %d. Returned: .
[ICMP]: Error sending packets to IP: %s. Packets sent: %d. Returned: .
[ICMP]: Done with %s flood to IP: %s. Sent: %d packet(s) @ %dKB/sec (%dMB).
[ICMP]: Done with %s flood to IP: %s. Sent: %d packet(s) @ %dKB/sec (%dMB).
PRIVMSG
PRIVMSG
%s %s :%s
%s %s :%s
Login - PayPal
Login - PayPal
moneybookers.com
moneybookers.com
AlertPay.com-My Way To Pay
AlertPay.com-My Way To Pay
Login: Step 1
Login: Step 1
h4cky0u.org
h4cky0u.org
Login
Login
Warez-BB.org :: Log in
Warez-BB.org :: Log in
DirectAdmin Login
DirectAdmin Login
Invision Power Services :: Invision Power Services : Login
Invision Power Services :: Invision Power Services : Login
Rapidshare-Premium.com - FREE Rapidshare Premium Link Generator
Rapidshare-Premium.com - FREE Rapidshare Premium Link Generator
Play.com (UK)
Play.com (UK)
Admin Login
Admin Login
Administrator Login
Administrator Login
amazon.com
amazon.com
MessengerFX.com - Web Messenger
MessengerFX.com - Web Messenger
ILoveIM.com Web Messenger
ILoveIM.com Web Messenger
Web and Mobile messenger everywhere - eBuddy former e-messenger
Web and Mobile messenger everywhere - eBuddy former e-messenger
meebo.com
meebo.com
Complete Web Solutions: domains, hosting, site builders and SSL.
Complete Web Solutions: domains, hosting, site builders and SSL.
[KeyLog] %s (%s)
[KeyLog] %s (%s)
[KeyLog] %s
[KeyLog] %s
[KeyLog] .
[KeyLog] .
. (Changed Windows: %s)
. (Changed Windows: %s)
. (Buffer full) (%s)
. (Buffer full) (%s)
. (Return) (%s)
. (Return) (%s)
kernel32.dll
kernel32.dll
ExitWindowsEx
ExitWindowsEx
GetAsyncKeyState
GetAsyncKeyState
GetKeyState
GetKeyState
advapi32.dll
advapi32.dll
RegOpenKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegCreateKeyExA
RegCloseKey
RegCloseKey
gdi32.dll
gdi32.dll
ws2_32.dll
ws2_32.dll
wininet.dll
wininet.dll
HttpOpenRequestA
HttpOpenRequestA
HttpSendRequestA
HttpSendRequestA
FtpGetFileA
FtpGetFileA
FtpPutFileA
FtpPutFileA
InternetOpenUrlA
InternetOpenUrlA
InternetCrackUrlA
InternetCrackUrlA
Mozilla/4.0 (compatible)
Mozilla/4.0 (compatible)
icmp.dll
icmp.dll
netapi32.dll
netapi32.dll
dnsapi.dll
dnsapi.dll
iphlpapi.dll
iphlpapi.dll
mpr.dll
mpr.dll
shell32.dll
shell32.dll
ShellExecuteA
ShellExecuteA
odbc32.dll
odbc32.dll
SQLDriverConnect
SQLDriverConnect
SQLSetEnvAttr
SQLSetEnvAttr
SQLExecDirect
SQLExecDirect
SQLAllocHandle
SQLAllocHandle
SQLFreeHandle
SQLFreeHandle
SQLDisconnect
SQLDisconnect
userenv.dll
userenv.dll
avicap32.dll
avicap32.dll
Kernel32.dll failed.
Kernel32.dll failed.
User32.dll failed.
User32.dll failed.
Advapi32.dll failed.
Advapi32.dll failed.
Gdi32.dll failed.
Gdi32.dll failed.
Ws2_32.dll failed.
Ws2_32.dll failed.
Wininet.dll failed.
Wininet.dll failed.
Icmp.dll failed.
Icmp.dll failed.
Netapi32.dll failed.
Netapi32.dll failed.
Dnsapi.dll failed.
Dnsapi.dll failed.
Iphlpapi.dll failed.
Iphlpapi.dll failed.
Mpr32.dll failed.
Mpr32.dll failed.
Shell32.dll failed.
Shell32.dll failed.
Odbc32.dll failed.
Odbc32.dll failed.
Avicap32.dll failed.
Avicap32.dll failed.
%s%s%s
%s%s%s
%s Error: %s .
%s Error: %s .
explorer.exe
explorer.exe
%s %s
%s %s
%sdel.bat
%sdel.bat
del "%s"
del "%s"
%%comspec%% /c %s %s
%%comspec%% /c %s %s
netsh.exe firewall add allowedprogram RIOTBOT.exe RIOTBOT ENABLE
netsh.exe firewall add allowedprogram RIOTBOT.exe RIOTBOT ENABLE
Software\Microsoft\Internet Explorer\New Windows
Software\Microsoft\Internet Explorer\New Windows
[Msn] Message sent to %d contacts!
[Msn] Message sent to %d contacts!
[FLUSHDNS]: Error getting ARP cache: .
[FLUSHDNS]: Error getting ARP cache: .
[FLUSHDNS]: Not supported by this system.
[FLUSHDNS]: Not supported by this system.
%d.%d.%d.%d
%d.%d.%d.%d
\Program Files\eDonkey2000\incoming
\Program Files\eDonkey2000\incoming
WinExec
WinExec
AVPCC.EXE
AVPCC.EXE
ACKWIN32.EXE
ACKWIN32.EXE
ADAWARE.EXE
ADAWARE.EXE
ADVXDWIN.EXE
ADVXDWIN.EXE
AGENTSVR.EXE
AGENTSVR.EXE
AGENTW.EXE
AGENTW.EXE
ALERTSVC.EXE
ALERTSVC.EXE
ALEVIR.EXE
ALEVIR.EXE
ALOGSERV.EXE
ALOGSERV.EXE
AMON9X.EXE
AMON9X.EXE
ANTI-TROJAN.EXE
ANTI-TROJAN.EXE
ANTIVIRUS.EXE
ANTIVIRUS.EXE
ANTS.EXE
ANTS.EXE
APIMONITOR.EXE
APIMONITOR.EXE
APLICA32.EXE
APLICA32.EXE
APVXDWIN.EXE
APVXDWIN.EXE
ARR.EXE
ARR.EXE
ATCON.EXE
ATCON.EXE
ATGUARD.EXE
ATGUARD.EXE
ATRO55EN.EXE
ATRO55EN.EXE
ATUPDATER.EXE
ATUPDATER.EXE
ATWATCH.EXE
ATWATCH.EXE
AU.EXE
AU.EXE
AUPDATE.EXE
AUPDATE.EXE
AUTODOWN.EXE
AUTODOWN.EXE
AUTOTRACE.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
AUTOUPDATE.EXE
AVCONSOL.EXE
AVCONSOL.EXE
AVE32.EXE
AVE32.EXE
AVGCC32.EXE
AVGCC32.EXE
AVGCTRL.EXE
AVGCTRL.EXE
AVGNT.EXE
AVGNT.EXE
AVGSERV.EXE
AVGSERV.EXE
AVGSERV9.EXE
AVGSERV9.EXE
AVGUARD.EXE
AVGUARD.EXE
AVGW.EXE
AVGW.EXE
AVKPOP.EXE
AVKPOP.EXE
AVKSERV.EXE
AVKSERV.EXE
AVKSERVICE.EXE
AVKSERVICE.EXE
AVKWCTl9.EXE
AVKWCTl9.EXE
AVLTMAIN.EXE
AVLTMAIN.EXE
AVNT.EXE
AVNT.EXE
AVP.EXE
AVP.EXE
AVP32.EXE
AVP32.EXE
AVPDOS32.EXE
AVPDOS32.EXE
AVPM.EXE
AVPM.EXE
AVPTC32.EXE
AVPTC32.EXE
AVPUPD.EXE
AVPUPD.EXE
AVSCHED32.EXE
AVSCHED32.EXE
AVSYNMGR.EXE
AVSYNMGR.EXE
AVWIN95.EXE
AVWIN95.EXE
AVWINNT.EXE
AVWINNT.EXE
AVWUPD.EXE
AVWUPD.EXE
AVWUPD32.EXE
AVWUPD32.EXE
AVWUPSRV.EXE
AVWUPSRV.EXE
AVXMONITOR9X.EXE
AVXMONITOR9X.EXE
AVXMONITORNT.EXE
AVXMONITORNT.EXE
AVXQUAR.EXE
AVXQUAR.EXE
BACKWEB.EXE
BACKWEB.EXE
BARGAINS.EXE
BARGAINS.EXE
BD_PROFESSIONAL.EXE
BD_PROFESSIONAL.EXE
BEAGLE.EXE
BEAGLE.EXE
BELT.EXE
BELT.EXE
BIDEF.EXE
BIDEF.EXE
BIDSERVER.EXE
BIDSERVER.EXE
BIPCP.EXE
BIPCP.EXE
BIPCPEVALSETUP.EXE
BIPCPEVALSETUP.EXE
BISP.EXE
BISP.EXE
BLACKD.EXE
BLACKD.EXE
BLACKICE.EXE
BLACKICE.EXE
BLSS.EXE
BLSS.EXE
BOOTCONF.EXE
BOOTCONF.EXE
BOOTWARN.EXE
BOOTWARN.EXE
BORG2.EXE
BORG2.EXE
BPC.EXE
BPC.EXE
BRASIL.EXE
BRASIL.EXE
BS120.EXE
BS120.EXE
BUNDLE.EXE
BUNDLE.EXE
BVT.EXE
BVT.EXE
CCEVTMGR.EXECSINJECT.EXE
CCEVTMGR.EXECSINJECT.EXE
CCAPP.EXE
CCAPP.EXE
CCEVTMGR.EXE
CCEVTMGR.EXE
CCPXYSVC.EXE
CCPXYSVC.EXE
CDP.EXE
CDP.EXE
CFD.EXE
CFD.EXE
CFGWIZ.EXE
CFGWIZ.EXE
CFIADMIN.EXE
CFIADMIN.EXE
CFIAUDIT.EXE
CFIAUDIT.EXE
CFINET.EXE
CFINET.EXE
CFINET32.EXE
CFINET32.EXE
CLAW95CF.EXE
CLAW95CF.EXE
CLEAN.EXE
CLEAN.EXE
CLEANER.EXE
CLEANER.EXE
CLEANER3.EXE
CLEANER3.EXE
CLEANPC.EXE
CLEANPC.EXE
CLICK.EXE
CLICK.EXE
CMD32.EXE
CMD32.EXE
CMESYS.EXE
CMESYS.EXE
CMGRDIAN.EXE
CMGRDIAN.EXE
CMON016.EXE
CMON016.EXE
CONNECTIONMONITOR.EXE
CONNECTIONMONITOR.EXE
CPD.EXE
CPD.EXE
CPF9X206.EXE
CPF9X206.EXE
CPFNT206.EXE
CPFNT206.EXE
CTRL.EXE
CTRL.EXE
CV.EXE
CV.EXE
CWNB181.EXE
CWNB181.EXE
CWNTDWMO.EXE
CWNTDWMO.EXE
Claw95.EXE
Claw95.EXE
DATEMANAGER.EXE
DATEMANAGER.EXE
DCOMX.EXE
DCOMX.EXE
DEFALERT.EXE
DEFALERT.EXE
DEFSCANGUI.EXE
DEFSCANGUI.EXE
DEFWATCH.EXE
DEFWATCH.EXE
DEPUTY.EXE
DEPUTY.EXE
DIVX.EXE
DIVX.EXE
DLLCACHE.EXE
DLLCACHE.EXE
DLLREG.EXE
DLLREG.EXE
DOORS.EXE
DOORS.EXE
DPF.EXE
DPF.EXE
DPFSETUP.EXE
DPFSETUP.EXE
DPPS2.EXE
DPPS2.EXE
DRWATSON.EXE
DRWATSON.EXE
DRWEB32.EXE
DRWEB32.EXE
DRWEBUPW.EXE
DRWEBUPW.EXE
DSSAGENT.EXE
DSSAGENT.EXE
DVP95.EXE
DVP95.EXE
DVP95_0.EXE
DVP95_0.EXE
ECENGINE.EXE
ECENGINE.EXE
EFPEADM.EXE
EFPEADM.EXE
EMSW.EXE
EMSW.EXE
ENT.EXE
ENT.EXE
ESAFE.EXE
ESAFE.EXE
ESCANH95.EXE
ESCANH95.EXE
ESCANHNT.EXE
ESCANHNT.EXE
ESCANV95.EXE
ESCANV95.EXE
ESPWATCH.EXE
ESPWATCH.EXE
ETHEREAL.EXE
ETHEREAL.EXE
ETRUSTCIPE.EXE
ETRUSTCIPE.EXE
EVPN.EXE
EVPN.EXE
EXANTIVIRUS-CNET.EXE
EXANTIVIRUS-CNET.EXE
EXE.AVXW.EXE
EXE.AVXW.EXE
EXPERT.EXE
EXPERT.EXE
EXPLORE.EXE
EXPLORE.EXE
F-RBOT.EXE
F-RBOT.EXE
F-SDBOT.EXE
F-SDBOT.EXE
F-SPYBOT.EXE
F-SPYBOT.EXE
F-AGOBOT.EXE
F-AGOBOT.EXE
F-RXBOT.EXE
F-RXBOT.EXE
F-AV.EXE
F-AV.EXE
F-PHATBOT.EXE
F-PHATBOT.EXE
F-FW.EXE
F-FW.EXE
F-AGNT95.EXE
F-AGNT95.EXE
F-PROT.EXE
F-PROT.EXE
F-PROT95.EXE
F-PROT95.EXE
F-STOPW.EXE
F-STOPW.EXE
FAMEH32.EXE
FAMEH32.EXE
FAST.EXE
FAST.EXE
FCH32.EXE
FCH32.EXE
FIH32.EXE
FIH32.EXE
FINDVIRU.EXE
FINDVIRU.EXE
FIREWALL.EXE
FIREWALL.EXE
FLOWPROTECTOR.EXE
FLOWPROTECTOR.EXE
FNRB32.EXE
FNRB32.EXE
FP-WIN.EXE
FP-WIN.EXE
FP-WIN_TRIAL.EXE
FP-WIN_TRIAL.EXE
FPROT.EXE
FPROT.EXE
FRW.EXE
FRW.EXE
FSAA.EXE
FSAA.EXE
FSAV.EXE
FSAV.EXE
FSAV32.EXE
FSAV32.EXE
FSAV530STBYB.EXE
FSAV530STBYB.EXE
FSAV530WTBYB.EXE
FSAV530WTBYB.EXE
FSAV95.EXE
FSAV95.EXE
FSGK32.EXE
FSGK32.EXE
FSM32.EXE
FSM32.EXE
FSMA32.EXE
FSMA32.EXE
FSMB32.EXE
FSMB32.EXE
GATOR.EXE
GATOR.EXE
GBMENU.EXE
GBMENU.EXE
GBPOLL.EXE
GBPOLL.EXE
GENERICS.EXE
GENERICS.EXE
GMT.EXE
GMT.EXE
GUARD.EXE
GUARD.EXE
GUARDDOG.EXE
GUARDDOG.EXE
HIJACKTHIS.EXE
HIJACKTHIS.EXE
HACKTRACERSETUP.EXE
HACKTRACERSETUP.EXE
HBINST.EXE
HBINST.EXE
HBSRV.EXE
HBSRV.EXE
HOTACTIO.EXE
HOTACTIO.EXE
HOTPATCH.EXE
HOTPATCH.EXE
HTLOG.EXE
HTLOG.EXE
HTPATCH.EXE
HTPATCH.EXE
HWPE.EXE
HWPE.EXE
HXDL.EXE
HXDL.EXE
HXIUL.EXE
HXIUL.EXE
IAMAPP.EXE
IAMAPP.EXE
IAMSERV.EXE
IAMSERV.EXE
IAMSTATS.EXE
IAMSTATS.EXE
IBMASN.EXE
IBMASN.EXE
IBMAVSP.EXE
IBMAVSP.EXE
ICLOAD95.EXE
ICLOAD95.EXE
ICLOADNT.EXE
ICLOADNT.EXE
ICMON.EXE
ICMON.EXE
ICSUPP95.EXE
ICSUPP95.EXE
ICSUPPNT.EXE
ICSUPPNT.EXE
IDLE.EXE
IDLE.EXE
IEDLL.EXE
IEDLL.EXE
IEDRIVER.EXE
IEDRIVER.EXE
IEXPLORER.EXE
IEXPLORER.EXE
IFACE.EXE
IFACE.EXE
IFW2000.EXE
IFW2000.EXE
INETLNFO.EXE
INETLNFO.EXE
INFUS.EXE
INFUS.EXE
INFWIN.EXE
INFWIN.EXE
INIT.EXE
INIT.EXE
INTDEL.EXE
INTDEL.EXE
INTREN.EXE
INTREN.EXE
IOMON98.EXE
IOMON98.EXE
IPARMOR.EXE
IPARMOR.EXE
IRIS.EXE
IRIS.EXE
ISASS.EXE
ISASS.EXE
ISRV95.EXE
ISRV95.EXE
ISTSVC.EXE
ISTSVC.EXE
JAMMER.EXE
JAMMER.EXE
JDBGMRG.EXE
JDBGMRG.EXE
JEDI.EXE
JEDI.EXE
KAVLITE40ENG.EXE
KAVLITE40ENG.EXE
KAVPERS40ENG.EXE
KAVPERS40ENG.EXE
KAVPF.EXE
KAVPF.EXE
KEENVALUE.EXE
KEENVALUE.EXE
KERIO-PF-213-EN-WIN.EXE
KERIO-PF-213-EN-WIN.EXE
KERIO-WRL-421-EN-WIN.EXE
KERIO-WRL-421-EN-WIN.EXE
KERIO-WRP-421-EN-WIN.EXE
KERIO-WRP-421-EN-WIN.EXE
KERNEL32.EXE
KERNEL32.EXE
KILLPROCESSSETUP161.EXE
KILLPROCESSSETUP161.EXE
LAUNCHER.EXE
LAUNCHER.EXE
LDNETMON.EXE
LDNETMON.EXE
LDPRO.EXE
LDPRO.EXE
LDPROMENU.EXE
LDPROMENU.EXE
LDSCAN.EXE
LDSCAN.EXE
LNETINFO.EXE
LNETINFO.EXE
LOADER.EXE
LOADER.EXE
LOCALNET.EXE
LOCALNET.EXE
LOCKDOWN.EXE
LOCKDOWN.EXE
LOCKDOWN2000.EXE
LOCKDOWN2000.EXE
LOOKOUT.EXE
LOOKOUT.EXE
LORDPE.EXE
LORDPE.EXE
LSETUP.EXE
LSETUP.EXE
LUALL.EXE
LUALL.EXE
LUAU.EXE
LUAU.EXE
LUCOMSERVER.EXE
LUCOMSERVER.EXE
LUINIT.EXE
LUINIT.EXE
LUSPT.EXE
LUSPT.EXE
MAPISVC32.EXE
MAPISVC32.EXE
MCAGENT.EXE
MCAGENT.EXE
MCMNHDLR.EXE
MCMNHDLR.EXE
MCSHIELD.EXE
MCSHIELD.EXE
MCTOOL.EXE
MCTOOL.EXE
MCUPDATE.EXE
MCUPDATE.EXE
MCVSRTE.EXE
MCVSRTE.EXE
MCVSSHLD.EXE
MCVSSHLD.EXE
MD.EXE
MD.EXE
MFIN32.EXE
MFIN32.EXE
MFW2EN.EXE
MFW2EN.EXE
MFWENG3.02D30.EXE
MFWENG3.02D30.EXE
MGAVRTCL.EXE
MGAVRTCL.EXE
MGAVRTE.EXE
MGAVRTE.EXE
MGHTML.EXE
MGHTML.EXE
MGUI.EXE
MGUI.EXE
MINILOG.EXE
MINILOG.EXE
MMOD.EXE
MMOD.EXE
MONITOR.EXE
MONITOR.EXE
MOOLIVE.EXE
MOOLIVE.EXE
MOSTAT.EXE
MOSTAT.EXE
MPFAGENT.EXE
MPFAGENT.EXE
MPFSERVICE.EXE
MPFSERVICE.EXE
MPFTRAY.EXE
MPFTRAY.EXE
MRFLUX.EXE
MRFLUX.EXE
MSCONFIG.EXEMSAPP.EXE
MSCONFIG.EXEMSAPP.EXE
MSBB.EXE
MSBB.EXE
MSBLAST.EXE
MSBLAST.EXE
MSCACHE.EXE
MSCACHE.EXE
MSCCN32.EXE
MSCCN32.EXE
MSCMAN.EXE
MSCMAN.EXE
MSDM.EXE
MSDM.EXE
MSDOS.EXE
MSDOS.EXE
MSIEXEC16.EXE
MSIEXEC16.EXE
MSINFO32.EXE
MSINFO32.EXE
MSLAUGH.EXE
MSLAUGH.EXE
MSMGT.EXE
MSMGT.EXE
MSMSGRI32.EXE
MSMSGRI32.EXE
MSSMMC32.EXE
MSSMMC32.EXE
MSSYS.EXE
MSSYS.EXE
MSVXD.EXE
MSVXD.EXE
MU0311AD.EXE
MU0311AD.EXE
MWATCH.EXE
MWATCH.EXE
N32SCANW.EXE
N32SCANW.EXE
NAV.EXE
NAV.EXE
AUTO-PROTECT.NAV80TRY.EXE
AUTO-PROTECT.NAV80TRY.EXE
NAVAP.NAVAPSVC.EXE
NAVAP.NAVAPSVC.EXE
NAVAPSVC.EXE
NAVAPSVC.EXE
NAVAPW32.EXE
NAVAPW32.EXE
NAVDX.EXE
NAVDX.EXE
NAVENGNAVEX15.NAVLU32.EXE
NAVENGNAVEX15.NAVLU32.EXE
NAVLU32.EXE
NAVLU32.EXE
NAVNT.EXE
NAVNT.EXE
NAVSTUB.EXE
NAVSTUB.EXE
NAVW32.EXE
NAVW32.EXE
NAVWNT.EXE
NAVWNT.EXE
NC2000.EXE
NC2000.EXE
NCINST4.EXE
NCINST4.EXE
NDD32.EXE
NDD32.EXE
NEOMONITOR.EXE
NEOMONITOR.EXE
NEOWATCHLOG.EXE
NEOWATCHLOG.EXE
NETSTAT.EXE
NETSTAT.EXE
NETARMOR.EXE
NETARMOR.EXE
NETD32.EXE
NETD32.EXE
NETINFO.EXE
NETINFO.EXE
NETMON.EXE
NETMON.EXE
NETSCANPRO.EXE
NETSCANPRO.EXE
NETSPYHUNTER-1.2.EXE
NETSPYHUNTER-1.2.EXE
NETUTILS.EXE
NETUTILS.EXE
NISSERV.EXE
NISSERV.EXE
NISUM.EXE
NISUM.EXE
NMAIN.EXE
NMAIN.EXE
NOD32.EXE
NOD32.EXE
NORMIST.EXE
NORMIST.EXE
NORTON_INTERNET_SECU_3.0_407.EXE
NORTON_INTERNET_SECU_3.0_407.EXE
NOTSTART.EXE
NOTSTART.EXE
NPF40_TW_98_NT_ME_2K.EXE
NPF40_TW_98_NT_ME_2K.EXE
NPFMESSENGER.EXE
NPFMESSENGER.EXE
NPROTECT.EXE
NPROTECT.EXE
NPSCHECK.EXE
NPSCHECK.EXE
NPSSVC.EXE
NPSSVC.EXE
NSCHED32.EXE
NSCHED32.EXE
NSSYS32.EXE
NSSYS32.EXE
NSTASK32.EXE
NSTASK32.EXE
NSUPDATE.EXE
NSUPDATE.EXE
NT.EXE
NT.EXE
NTRTSCAN.EXE
NTRTSCAN.EXE
NTVDM.EXE
NTVDM.EXE
NTXconfig.EXE
NTXconfig.EXE
NUI.EXE
NUI.EXE
NUPGRADE.EXE
NUPGRADE.EXE
NVARCH16.EXE
NVARCH16.EXE
NVC95.EXE
NVC95.EXE
NVSVC32.EXE
NVSVC32.EXE
NWINST4.EXE
NWINST4.EXE
NWSERVICE.EXE
NWSERVICE.EXE
NWTOOL16.EXE
NWTOOL16.EXE
OGRC.EXE
OGRC.EXE
OLLYDBG.EXE
OLLYDBG.EXE
ONSRVR.EXE
ONSRVR.EXE
OPTIMIZE.EXE
OPTIMIZE.EXE
OSTRONET.EXE
OSTRONET.EXE
OTFIX.EXE
OTFIX.EXE
OUTPOST.EXE
OUTPOST.EXE
OUTPOSTINSTALL.EXE
OUTPOSTINSTALL.EXE
OUTPOSTPROINSTALL.EXE
OUTPOSTPROINSTALL.EXE
PADMIN.EXE
PADMIN.EXE
PANIXK.EXE
PANIXK.EXE
PATCH.EXE
PATCH.EXE
PAVCL.EXE
PAVCL.EXE
PAVPROXY.EXE
PAVPROXY.EXE
PAVSCHED.EXE
PAVSCHED.EXE
PAVW.EXE
PAVW.EXE
PCC2002S902.EXE
PCC2002S902.EXE
PCC2K_76_1436.EXE
PCC2K_76_1436.EXE
PCCIOMON.EXE
PCCIOMON.EXE
PCCNTMON.EXE
PCCNTMON.EXE
PCCWIN97.EXE
PCCWIN97.EXE
PCCWIN98.EXE
PCCWIN98.EXE
PCDSETUP.EXE
PCDSETUP.EXE
PCFWALLICON.EXE
PCFWALLICON.EXE
PCIP10117_0.EXE
PCIP10117_0.EXE
PCSCAN.EXE
PCSCAN.EXE
PDSETUP.EXE
PDSETUP.EXE
PENIS.EXE
PENIS.EXE
PERISCOPE.EXE
PERISCOPE.EXE
PERSFW.EXE
PERSFW.EXE
PERSWF.EXE
PERSWF.EXE
PF2.EXE
PF2.EXE
PFWADMIN.EXE
PFWADMIN.EXE
PGMONITR.EXE
PGMONITR.EXE
PINGSCAN.EXE
PINGSCAN.EXE
PLATIN.EXE
PLATIN.EXE
POP3TRAP.EXE
POP3TRAP.EXE
POPROXY.EXE
POPROXY.EXE
POPSCAN.EXE
POPSCAN.EXE
PORTDETECTIVE.EXE
PORTDETECTIVE.EXE
PORTMONITOR.EXE
PORTMONITOR.EXE
POWERSCAN.EXE
POWERSCAN.EXE
PPINUPDT.EXE
PPINUPDT.EXE
PPTBC.EXE
PPTBC.EXE
PPVSTOP.EXE
PPVSTOP.EXE
PRIZESURFER.EXE
PRIZESURFER.EXE
PRMT.EXE
PRMT.EXE
PRMVR.EXE
PRMVR.EXE
PROCDUMP.EXE
PROCDUMP.EXE
PROCESSMONITOR.EXE
PROCESSMONITOR.EXE
PROCEXPLORERV1.0.EXE
PROCEXPLORERV1.0.EXE
PROGRAMAUDITOR.EXE
PROGRAMAUDITOR.EXE
PROPORT.EXE
PROPORT.EXE
PROTECTX.EXE
PROTECTX.EXE
PSPF.EXE
PSPF.EXE
PURGE.EXE
PURGE.EXE
PUSSY.EXE
PUSSY.EXE
PVIEW95.EXE
PVIEW95.EXE
QDCSFS.EXE
QDCSFS.EXE
QCONSOLE.EXE
QCONSOLE.EXE
QSERVER.EXE
QSERVER.EXE
RAPAPP.EXE
RAPAPP.EXE
RAV7.EXE
RAV7.EXE
RAV7WIN.EXE
RAV7WIN.EXE
RAV8WIN32ENG.EXE
RAV8WIN32ENG.EXE
RAY.EXE
RAY.EXE
RB32.EXE
RB32.EXE
RCSYNC.EXE
RCSYNC.EXE
REALMON.EXE
REALMON.EXE
REGED.EXE
REGED.EXE
REGEDT32.EXE
REGEDT32.EXE
REGEDIT.EXE
REGEDIT.EXE
RESCUE.EXE
RESCUE.EXE
RESCUE32.EXE
RESCUE32.EXE
RRGUARD.EXE
RRGUARD.EXE
RSHELL.EXE
RSHELL.EXE
RTVSCAN.EXE
RTVSCAN.EXE
RTVSCN95.EXE
RTVSCN95.EXE
RULAUNCH.EXE
RULAUNCH.EXE
RUN32DLL.EXE
RUN32DLL.EXE
RUNDLL.EXE
RUNDLL.EXE
RUNDLL16.EXE
RUNDLL16.EXE
RUXDLL32.EXE
RUXDLL32.EXE
SBSERV.EXE
SBSERV.EXE
SYMTRAY.EXE
SYMTRAY.EXE
SAFEWEB.EXE
SAFEWEB.EXE
SAHAGENT.EXE
SAHAGENT.EXE
SAVE.EXE
SAVE.EXE
SAVENOW.EXE
SAVENOW.EXE
SC.EXE
SC.EXE
SCAM32.EXE
SCAM32.EXE
SCAN32.EXE
SCAN32.EXE
SCAN95.EXE
SCAN95.EXE
SCANPM.EXE
SCANPM.EXE
SCRSCAN.EXE
SCRSCAN.EXE
SCRSVR.EXE
SCRSVR.EXE
SCVHOST.EXE
SCVHOST.EXE
SD.EXE
SD.EXE
SERV95.EXE
SERV95.EXE
SERVICE.EXE
SERVICE.EXE
SERVLCE.EXE
SERVLCE.EXE
SERVLCES.EXE
SERVLCES.EXE
SETUPVAMEEVAL.EXE
SETUPVAMEEVAL.EXE
SETUP_FLOWPROTECTOR_US.EXE
SETUP_FLOWPROTECTOR_US.EXE
SFC.EXE
SFC.EXE
SGSSFW32.EXE
SGSSFW32.EXE
SH.EXE
SH.EXE
SHELLSPYINSTALL.EXE
SHELLSPYINSTALL.EXE
SHN.EXE
SHN.EXE
SHOWBEHIND.EXE
SHOWBEHIND.EXE
SMC.EXE
SMC.EXE
SMS.EXE
SMS.EXE
SMSS32.EXE
SMSS32.EXE
SOAP.EXE
SOAP.EXE
SOFI.EXE
SOFI.EXE
SPERM.EXE
SPERM.EXE
SPF.EXE
SPF.EXE
SPHINX.EXE
SPHINX.EXE
SPOLER.EXE
SPOLER.EXE
SPOOLCV.EXE
SPOOLCV.EXE
SPOOLSV32.EXE
SPOOLSV32.EXE
SPYXX.EXE
SPYXX.EXE
SREXE.EXE
SREXE.EXE
SRNG.EXE
SRNG.EXE
SS3EDIT.EXE
SS3EDIT.EXE
SSGRATE.EXE
SSGRATE.EXE
SSG_4104.EXE
SSG_4104.EXE
ST2.EXE
ST2.EXE
START.EXE
START.EXE
STCLOADER.EXE
STCLOADER.EXE
SUPFTRL.EXE
SUPFTRL.EXE
SUPPORT.EXE
SUPPORT.EXE
SUPPORTER5.EXE
SUPPORTER5.EXE
SVC.EXE
SVC.EXE
SVCHOSTC.EXE
SVCHOSTC.EXE
SVCHOSTS.EXE
SVCHOSTS.EXE
SVSHOST.EXE
SVSHOST.EXE
SWEEP95.EXE
SWEEP95.EXE
SWEEPNET.SWEEPSRV.SYS.SWNETSUP.EXE
SWEEPNET.SWEEPSRV.SYS.SWNETSUP.EXE
SYMPROXYSVC.EXE
SYMPROXYSVC.EXE
SYSEDIT.EXE
SYSEDIT.EXE
SYSTEM.EXE
SYSTEM.EXE
SYSTEM32.EXE
SYSTEM32.EXE
SYSUPD.EXE
SYSUPD.EXE
TASKMG.EXE
TASKMG.EXE
TASKMO.EXE
TASKMO.EXE
TAUMON.EXE
TAUMON.EXE
TBSCAN.EXE
TBSCAN.EXE
TC.EXE
TC.EXE
TCA.EXE
TCA.EXE
TCM.EXE
TCM.EXE
TDS-3.EXE
TDS-3.EXE
TDS2-98.EXE
TDS2-98.EXE
TDS2-NT.EXE
TDS2-NT.EXE
TEEKIDS.EXE
TEEKIDS.EXE
TFAK.EXE
TFAK.EXE
TFAK5.EXE
TFAK5.EXE
TGBOB.EXE
TGBOB.EXE
TITANIN.EXE
TITANIN.EXE
TITANINXP.EXE
TITANINXP.EXE
TRACERT.EXE
TRACERT.EXE
TRICKLER.EXE
TRICKLER.EXE
TRJSCAN.EXE
TRJSCAN.EXE
TRJSETUP.EXE
TRJSETUP.EXE
TROJANTRAP3.EXE
TROJANTRAP3.EXE
TSADBOT.EXE
TSADBOT.EXE
TVMD.EXE
TVMD.EXE
TVTMD.EXE
TVTMD.EXE
UNDOBOOT.EXE
UNDOBOOT.EXE
UPDAT.EXE
UPDAT.EXE
UPDATE.EXE
UPDATE.EXE
UPGRAD.EXE
UPGRAD.EXE
UTPOST.EXE
UTPOST.EXE
VFY.EXE
VFY.EXE
VBCMSERV.EXE
VBCMSERV.EXE
VBCONS.EXE
VBCONS.EXE
VBUST.EXE
VBUST.EXE
VBWIN9X.EXE
VBWIN9X.EXE
VBWINNTW.EXE
VBWINNTW.EXE
VCSETUP.EXE
VCSETUP.EXE
VET32.EXE
VET32.EXE
VET95.EXE
VET95.EXE
VETTRAY.EXE
VETTRAY.EXE
VFSETUP.EXE
VFSETUP.EXE
VIR-HELP.EXE
VIR-HELP.EXE
VIRUSMDPERSONALFIREWALL.EXE
VIRUSMDPERSONALFIREWALL.EXE
VNLAN300.EXE
VNLAN300.EXE
VNPC3000.EXE
VNPC3000.EXE
VPC32.EXE
VPC32.EXE
VPC42.EXE
VPC42.EXE
VPFW30S.EXE
VPFW30S.EXE
VPTRAY.EXE
VPTRAY.EXE
VSCAN40.EXE
VSCAN40.EXE
VSCENU6.02D30.EXE
VSCENU6.02D30.EXE
VSCHED.EXE
VSCHED.EXE
VSECOMR.EXE
VSECOMR.EXE
VSHWIN32.EXE
VSHWIN32.EXE
VSISETUP.EXE
VSISETUP.EXE
VSMAIN.EXE
VSMAIN.EXE
VSMON.EXE
VSMON.EXE
VSSTAT.EXE
VSSTAT.EXE
VSWIN9XE.EXE
VSWIN9XE.EXE
VSWINNTSE.EXE
VSWINNTSE.EXE
VSWINPERSE.EXE
VSWINPERSE.EXE
W32DSM89.EXE
W32DSM89.EXE
W9X.EXE
W9X.EXE
WATCHDOG.EXE
WATCHDOG.EXE
WEBDAV.EXE
WEBDAV.EXE
WEBSCANX.EXE
WEBSCANX.EXE
WEBTRAP.EXE
WEBTRAP.EXE
WFINDV32.EXE
WFINDV32.EXE
WGFE95.EXE
WGFE95.EXE
WHOSWATCHINGME.EXE
WHOSWATCHINGME.EXE
WIMMUN32.EXE
WIMMUN32.EXE
WIN-BUGSFIX.EXE
WIN-BUGSFIX.EXE
WIN32.EXE
WIN32.EXE
WIN32US.EXE
WIN32US.EXE
WINACTIVE.EXE
WINACTIVE.EXE
WINDOW.EXE
WINDOW.EXE
WINDOWS.EXE
WINDOWS.EXE
WININETD.EXE
WININETD.EXE
WININIT.EXE
WININIT.EXE
WININITX.EXE
WININITX.EXE
WINLOGIN.EXE
WINLOGIN.EXE
WINMAIN.EXE
WINMAIN.EXE
WINNET.EXE
WINNET.EXE
WINPPR32.EXE
WINPPR32.EXE
WINRECON.EXE
WINRECON.EXE
WINSERVN.EXE
WINSERVN.EXE
WINSSK32.EXE
WINSSK32.EXE
WINSTART.EXE
WINSTART.EXE
WINSTART001.EXE
WINSTART001.EXE
WINTSK32.EXE
WINTSK32.EXE
WINUPDATE.EXE
WINUPDATE.EXE
WKUFIND.EXE
WKUFIND.EXE
WNAD.EXE
WNAD.EXE
WNT.EXE
WNT.EXE
WRADMIN.EXE
WRADMIN.EXE
WRCTRL.EXE
WRCTRL.EXE
WSBGATE.EXE
WSBGATE.EXE
WUPDATER.EXE
WUPDATER.EXE
WUPDT.EXE
WUPDT.EXE
WYVERNWORKSFIREWALL.EXE
WYVERNWORKSFIREWALL.EXE
XPF202EN.EXE
XPF202EN.EXE
ZAPRO.EXE
ZAPRO.EXE
ZAPSETUP3001.EXE
ZAPSETUP3001.EXE
ZATUTOR.EXE
ZATUTOR.EXE
ZONALM2601.EXE
ZONALM2601.EXE
ZONEALARM.EXE
ZONEALARM.EXE
_AVP32.EXE
_AVP32.EXE
_AVPCC.EXE
_AVPCC.EXE
_AVPM.EXE
_AVPM.EXE
%s (%d)
%s (%d)
PONG %s
PONG %s
NOTICE %s :
NOTICE %s :
VERSION %s
VERSION %s
PING %s
PING %s
[MAIN]: User: %s logged out.
[MAIN]: User: %s logged out.
NOTICE %s :%s
NOTICE %s :%s
NICK
NICK
[MAIN]: Master: %s changed identity to: .
[MAIN]: Master: %s changed identity to: .
:%s%s
:%s%s
[MAIN]: Failed to change nick for Master: %s.
[MAIN]: Failed to change nick for Master: %s.
USERHOST %s
USERHOST %s
MODE %s %s
MODE %s %s
:.login
:.login
JOIN #
JOIN #
NICK
NICK
now an IRC Operator
now an IRC Operator
Password
Password
password
password
PASSWORD
PASSWORD
login
login
Login
Login
LOGIN
LOGIN
Login
Login
LOGIN
LOGIN
login
login
PASSWORD
PASSWORD
password
password
paypal.com
paypal.com
e-gold.com
e-gold.com
alertpay.com
alertpay.com
ebay.com
ebay.com
americabank.com
americabank.com
[PSNIFF]: Error: socket() failed, returned: .
[PSNIFF]: Error: socket() failed, returned: .
[PSNIFF]: Error: bind() failed, returned: .
[PSNIFF]: Error: bind() failed, returned: .
[PSNIFF]: Error: WSAIoctl() failed, returned: .
[PSNIFF]: Error: WSAIoctl() failed, returned: .
[PSNIFF]: Error: recv() failed, returned:
[PSNIFF]: Error: recv() failed, returned:
[PSNIFF]: Suspicious %s packet from: %s:%d to: %s:%d - %s
[PSNIFF]: Suspicious %s packet from: %s:%d to: %s:%d - %s
pstorec.dll
pstorec.dll
-=PSTORE=- %s %s:%s
-=PSTORE=- %s %s:%s
http:/
http:/
https:/
https:/
superbotijos.zapto.org
superbotijos.zapto.org
superbotijos2.zapto.org
superbotijos2.zapto.org
service.exe
service.exe
servicex.log
servicex.log
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunServices
Software\Microsoft\Windows\CurrentVersion\RunServices
password1
password1
passwd
passwd
pass1234
pass1234
1234567
1234567
12345678
12345678
123456789
123456789
1234567890
1234567890
12345678910
12345678910
windows
windows
loginpass
loginpass
domainpass
domainpass
domainpassword
domainpassword
dbpass
dbpass
dbpassword
dbpassword
databasepass
databasepass
databasepassword
databasepassword
sqlpassoainstall
sqlpassoainstall
winpass
winpass
%s %d "%s"
%s %d "%s"
[%s]|
[%s]|
[%d]%s
[%d]%s
%d. %s
%d. %s
%s: %s stopped. (%d thread(s) stopped.)
%s: %s stopped. (%d thread(s) stopped.)
%s: No %s thread found.
%s: No %s thread found.
\Desktop.ini
\Desktop.ini
[.ShellClassInfo]
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
icon=%SystemRoot%\system32\SHELL32.dll,4
icon=%SystemRoot%\system32\SHELL32.dll,4
\autorun.inf
\autorun.inf
[VISIT]: Invalid URL.
[VISIT]: Invalid URL.
[VISIT]: Failed to connect to HTTP server.
[VISIT]: Failed to connect to HTTP server.
[VISIT]: URL visited.
[VISIT]: URL visited.
[VISIT]: Failed to get requested URL from HTTP server.
[VISIT]: Failed to get requested URL from HTTP server.
zcÃ
zcÃ
%System%\service.exe
%System%\service.exe
EnumWindows
EnumWindows
keybd_event
keybd_event
VkKeyScanA
VkKeyScanA
USER32.dll
USER32.dll
ole32.dll
ole32.dll
OLEAUT32.dll
OLEAUT32.dll
URLDownloadToFileA
URLDownloadToFileA
urlmon.dll
urlmon.dll
GetCPInfo
GetCPInfo
KERNEL32.dll
KERNEL32.dll
6 6/6?6~6
6 6/6?6~6
8-9}9
8-9}9
2-2R2x2}2
2-2R2x2}2
:";(;,;0;4;
:";(;,;0;4;
? ?4???[?
? ?4???[?
6 6$6(6,6064686
6 6$6(6,6064686
7074787
7074787
: :$:(:,:0:4:8:<:>
: :$:(:,:0:4:8:<:>