Backdoor.Win32.Xtreme_bd3fb39882
Trojan-Dropper.Win32.Agent.kiam (Kaspersky), Trojan.Win32.Generic!SB.0 (VIPRE), Artemis!BD3FB3988281 (McAfee), WS.Reputation.1 (Symantec), Backdoor.Win32.Xtreme.FD, Trojan-PSW.Win32.MSNPassword.FD, Trojan.MSIL.Bladabindi.2.FD, Trojan.Win32.Ransom.FD, BackdoorXtreme.YR, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan-PSW, Ransom, Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: bd3fb39882817e7f8c738d7a405ee970
SHA1: 0b825aa3ab6d2843881431dd111ba39b19f07ade
SHA256: 232d8951079fabdf7c78b8d13138d4afff8810396164629429aa27827003f235
SSDeep: 49152:wLQzAZuXFePwhZcjC2L6xYE3jINgBwji5IwyGwFRv6usU9Tsn:wLbZ FfZc7OxL32i5ISwFlUiG
Size: 2240717 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PackerUPXCompresorGratuitowwwupxsourceforgenet, UPolyXv05_v6
Company: AirInstaller Inc.
Created at: 2007-08-19 11:31:03
Analyzed on: WindowsXP SP3 32-bit
Summary:
Backdoor. Malware that enables a remote control of victim's machine.
Payload
No specific payload has been found.
Process activity
The Backdoor creates the following process(es):
WScript.exe:640
win7.exe:316
The Backdoor injects its code into the following process(es):
%original file name%.exe:636
File activity
The process %original file name%.exe:636 makes changes in the file system.
The Backdoor creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\re.txt (735 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\win7.exe (5105568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FP83.tmp (229 bytes)
The process win7.exe:316 makes changes in the file system.
The Backdoor creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\foxyinstalled.dll (52736 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\LinkMaker.dll (112640 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\Conf\Addresses.cfg (2296 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\win7.exe (5234688 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\win7.vbs (574 bytes)
The Backdoor deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_2324593 (0 bytes)
Registry activity
The process WScript.exe:640 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 68 24 02 F7 84 15 CE 92 C5 49 BB 5E FF B1 C1"
To automatically run itself each time Windows is booted, the Backdoor adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"office" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\office.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"office" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\office.exe"
The process %original file name%.exe:636 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "33 90 D8 BA 66 92 01 8B 5B 25 74 19 1C 5C E8 C1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Ãâ€Ã¾ÃºÑƒÃ¼ÃµÃ½Ñ‚Ñ‹"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\àðñþчøù ÑÂтþû"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{91167d45-103d-11db-8c91-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d8c0d8da-77bd-11e0-bb02-000c293bc0fd}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"Win7.exe" = "win7"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{91167d42-103d-11db-8c91-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\àðñþчøù ÑÂтþû"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\Üþø ôþúуüõýты"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{ebcf8d94-66db-11de-b228-806d6172696f}]
"BaseClass" = "Drive"
The Backdoor modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Backdoor modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Backdoor modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process win7.exe:316 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CD B2 59 7E DF 9E D0 88 14 2C 4B 5C 08 18 09 66"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Ãâ€Ã¾ÃºÑƒÃ¼ÃµÃ½Ñ‚Ñ‹"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\àðñþчøù ÑÂтþû"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{91167d45-103d-11db-8c91-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d8c0d8da-77bd-11e0-bb02-000c293bc0fd}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{91167d42-103d-11db-8c91-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\àðñþчøù ÑÂтþû"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"wscript.exe" = "Microsoft (R) Windows Based Script Host"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\Üþø ôþúуüõýты"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{ebcf8d94-66db-11de-b228-806d6172696f}]
"BaseClass" = "Drive"
The Backdoor modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Backdoor modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Backdoor modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Dropped PE files
| MD5 | File path |
|---|---|
| f99284cb305f0066af93751196430251 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\RarSFX0\LinkMaker.dll |
| 56729a2ca39504b7a169f536038a227e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\RarSFX0\foxyinstalled.dll |
| 946dd12bc59f2c0f4431d5baf58d7d13 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\RarSFX0\win7.exe |
| 31c84c51286421b92f60227f090e9afe | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\win7.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 94208 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| UPX1 | 98304 | 45056 | 41984 | 5.46551 | 979b28bf1021dd5e1dee769a42a539f9 |
| .rsrc | 143360 | 4096 | 4096 | 3.12755 | f1191a30b1e60b1bb9284f96162937cc |
Dropped from:
c168db521c2bd276ca8ea3dabd31e355
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 3
4284fb73d8c89d60b08f4472e5df8efc
e52e0b2d2d341fe6681f1b395a2ff140
882feefa2d6bce352779ca857033919e
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
`.rsrc
ERROR #0027 Wrong password
The password that you typed is not correct.
Password:
This executable is password protected. Please enter the password in the box below.
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Please select or create the folder where you would like to extract the files packed in this executable.
CmdLine
Password needed.
Password
invalid executable code
unzip 1.01 Copyright 1998-2004 Gilles Vollant - http://www.winimage.com/zLibDll
1.2.2
inflate 1.2.2 Copyright 1995-2004 Mark Adler
c:\%original file name%.exe
:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\win7.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
win7.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\win7.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\FP83.tmp
GetWindowsDirectoryA
RegOpenKeyExA
RegCloseKey
ShellExecuteExA
SHFileOperationA
CreateDialogIndirectParamA
.text
`.rdata
@.data
.rsrc
KeydA
name="JvwComputing.|.FilePacker v1.1 for Windows 9x/2000/XP"
version="1.1.0.0"
FilePacker v1.1 for Windows.
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
ole32.dll
SHELL32.dll
USER32.dll
%original file name%.exe_636_rwx_00401000_00021000:
ERROR #0027 Wrong password
The password that you typed is not correct.
Password:
This executable is password protected. Please enter the password in the box below.
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Please select or create the folder where you would like to extract the files packed in this executable.
CmdLine
Password needed.
Password
invalid executable code
unzip 1.01 Copyright 1998-2004 Gilles Vollant - http://www.winimage.com/zLibDll
1.2.2
inflate 1.2.2 Copyright 1995-2004 Mark Adler
c:\%original file name%.exe
:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\win7.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
win7.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\win7.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\FP83.tmp
GetWindowsDirectoryA
RegOpenKeyExA
RegCloseKey
ShellExecuteExA
SHFileOperationA
CreateDialogIndirectParamA
.text
`.rdata
@.data
.rsrc
KeydA
uedit32.exe_1948:
.text
`.rdata
@.data
.SHARED
.rsrc
SSSSSh
t>SSh
tlSSh
9~l~%S
FtPhz
u.SVj
zv^<_tZ<$tV<#tR<.tN<\tJtYSSht.WWQPPPSSSh<|6SSh&t.HHt*j|0SShtZSSh.SVSSSVVSSSFtPh~%UUhP\SSh%SSSQSSSQSSS.tTPVFTPjKFtPj;F.PjRWj?%u#fu.hxYYu.WWju.VVju$SShe@u.WjSSSShBar#%dMRUDockLeftPos%s-Summary%s-Bar%dhhctrl.ocxCLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32%*.*f{X-X-X-XX-XXXXXX}commctrl_DragListMsgAfx:%x:%x:%x:%x:%xAfx:%x:%xCOMCTL32.DLLCCmdTargetGDI32.DLLCMDIChildWndCMDIFrameWndwindowsCNotSupportedExceptionRICHED32.DLLCTL3D32.DLLMAPI32.DLLKERNEL32.DLLddeexec%s\ShellNew%s\DefaultIcon%s\shell\printto\%s%s\shell\print\%s%s\shell\open\%sole32.dll__MSVCRT_HEAP_SELECTportuguese-brazilianIMM32.dllWS2_32.dllMPR.dllTIDYLIB.dllSftp_AbortSftp_SetAuthenticationSftp_SetBlockingSftp_CreateSftp_DestroySftp_DisconnectSftp_GetStateSftp_ConnectSftp_LoadPrivateKeySftp_SetPortSftp_SetPasswordSftp_SetLoginSftp_SetHostnameSftp_SetCompressionSftp_PutFileSftp_SetTransferModeSftp_GetListItemSftp_ListDirSftp_GetFileSftp_RealPathSftp_GetRemotePathSftp_SetRemotePathSftp_SetAttributesSftp_MakeDirSftp_RenameSftp_DeleteFileSftp_RemoveDirSftp_GetServerErrorTextSftp_GetServerErrorCodeSftp_GetErrorTextSftpDLL.dllGetWindowsDirectoryAWinExecGetCPInfoCreatePipeKERNEL32.dllGetKeyStateMapVirtualKeyAGetKeyboardStateSetWindowsHookExAUnhookWindowsHookExGetKeyboardLayoutGetAsyncKeyStateSetKeyboardStateCreateDialogIndirectParamAUSER32.dllSetViewportOrgExOffsetViewportOrgExSetViewportExtExScaleViewportExtExGetViewportExtExGetViewportOrgExGDI32.dllcomdlg32.dllWINSPOOL.DRVRegCloseKeyRegCreateKeyExARegOpenKeyExARegDeleteKeyARegEnumKeyExARegOpenKeyARegCreateKeyAADVAPI32.dllShellExecuteASHFileOperationAShellExecuteExASHELL32.dllCOMCTL32.dlloledlg.dllOLEPRO32.DLLOLEAUT32.dllRPCRT4.dllSHDeleteKeyASHLWAPI.dllHttpQueryInfoAHttpSendRequestAHttpOpenRequestAWININET.dllueres.dllBitmap Files (*.bmp)|*.bmp|Unnamed Toolbar No.%d%s %s%sW%c %d %sFTP::ID_ISENSE_KEYWORDLISTID_CVS_EXPORTID_CVS_IMPORTID_HTML_CMD28ID_HTML_CMD27ID_HTML_CMD26ID_HTML_CMD25ID_HTML_CMD24ID_HTML_CMD23ID_HTML_CMD22ID_HTML_CMD21ID_HTML_CMD20ID_HTML_CMD19ID_HTML_CMD18ID_HTML_CMD17ID_HTML_CMD16ID_HTML_CMD15ID_HTML_CMD14ID_HTML_CMD13ID_HTML_CMD12ID_HTML_CMD11ID_HTML_CMD10ID_HTML_CMD09ID_HTML_CMD08ID_HTML_CMD07ID_HTML_CMD06ID_HTML_CMD05ID_HTML_CMD04ID_HTML_CMD03ID_HTML_CMD02ID_HTML_CMD01ID_EDIT_HEXEBCDICID_FIX_LEFTPANEID_FTP_OPENID_FTP_SAVEASID_KEYAID_KEYA_SHIFTID_KEYOID_KEYO_SHIFTID_KEYSID_KEYS_SHIFTID_KEYUID_KEYU_SHIFTID_RUNDOSCMDID_RUNDOSCMD1ID_SYNC_WINDOWSGNU\Aspell\bin\aspell-15.dll*.tfg*.mfg%m.%d.%yFTP::%s\%m/%d/%y %H:%M%s-SCBar-%d%m/%d/%y, %H:%MExportedType.4.4.4.t35.2.2.2.2.4.#b.#s.#s.#b.4.4.4.4.2.2.2.2.4.#b.#s.#s.4.2.2.#s.#b.t8unknown error (%x)file is not a NET executable !file is not PE executable !file is not executable !#XXXImage Files (*.gif;*.jpg;*.jpeg;*.bmp;*.png)|*.gif;*.jpg;*.jpeg;*.bmp;*.png||http://www.w3.org/TR/REC-CSS2HTML Tidy Config Files (*.txt;*.cfg;*.conf)|*.txt; *.cfg; *.conf||*.dll*.HLP; *.CHMPlease install latest version of Aspell for Windowsignore-X-%s.csvpersonal_ws-1.1 %s %dProject contains one or more FTP files.This version of Back Up doesn't support FTP files yet. Do you want to continue ?CCfgKeyBdUnknown Key.PAVCFileException@@Error writing keyboard fileTool Cmd*.BMP; *.ICOGetCPInfoExAkernel32.dllBurlyWoodRGB(0x%X, 0x%X, 0x%X)XXXRGB(0xx,0xx,0xx)%s%u%s%s0xxxx%s%s#%s%sAll Files (*.*)|*.*|.vjsproj.vcproj.vbproj.csprojues.id\Microsoft .NET\winexeWindows Applicationpass32.\cset.pathsuedit32.iniUEDIT32.mnuUEDIT32.tbrPlease download the latest version from www.ultraedit.comBetaKeyuedit32.reg%u,%u,%d,%d,%d,%d,%d,%d,%d,%dRecent Project %dCompare EXECtag EXE#2$!*&%$#3(&mailto:[email protected]http://www.idmcomp.comhttp://www.ultraedit.comWORDFILE.TXTTAB Windows Font HeightTAB Windows FontExtra Windows Font HeightExtra Windows FontOLD FTP DIRSkip FTP Connect CloseFindInFiles-Use Windows-L %fi -f %foGNU\ctags.exetags.lstReload FTP FilesUse Windows Default DirNoAutoSaveFTPFilesFile%dHexEditFTPRenameDeleteCannot load resource dll: ueres.dll, quitting!uninstal.exeINSTALL.LOG.PAVCException@@sShortDateucl.exesoftware\microsoft\windows\currentversion\app paths\uc.exeuediff.exeuedit32.exeuedit32.exe "*.prjhttps:http:.java:http://www.ultraedit.com/ue_register.html%s\IDMComp\%s\%sBasic.mfgBasic.tfgAdvanced.tfgAdvanced.mfg%s\%s\"{" "(" "[" "<""{" "(" "[""(" "[" "<""}" ")" "]" ">""}" ")" "]"")" "]" ">""" "/>"STYLE_KEYWORDSTYLE_OPERATOR!$*);^-/0123456789!"#$(* ,;01:3)4]$*);^-/Cannot create temp file for FTP Save~atu.tmp.html~ue.htmlReportDoubleDOS ExecuteWin ExecuteMSWHEEL_ROLLMSG{4e0be4eb-63dc-42a0-9a30-0cb1c39ff6b8}{02062954-ddc8-424e-bf76-c97e844b1085}\uedit32v11.cfgIfFTP*.TXTHtmlCommanddRichEd32.dllMacro Auto Execute Error*.EXE; *.COM; *.BAT*.EXEcommand.comcmd.exe /c\command.com /cUEDOS32.EXE"cmd /c\command.com /E:2048 /c%sel%%col%ftp:/UETMPLTE.DAT&%d %s\Insert\*.insuser32.dll0xX 0xXError reading keyboard file*.HTML;*.HTM;*.JAVA;*.JAV*.H;*.HPP*.C;*.CPP*.INI*.BAT*.DOCSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Foldersline %u column %u%d/%m/%Y, %H:%M%m/%d/%Y, %H:%MSolution Files (*.prw)|*.prw||Project Files (*.prj)|*.prj||Bitmap Path%dA severe error (%d) occured.test.htmIMPLEMENT_OLECREATE(@@CURSOR@@, , 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X);DEFINE_GUID(@@CURSOR@@, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X);static const GUID @@CURSOR@@ = { 0x%X, 0x%X, 0x%X, { 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X, 0x%X } };AStyle [http://astyle.sf.net] ...*.exeAstyle (*.exe)|*.exe||Astyle.exeRichEd20.dllMSH_SCROLL_LINES_MSGCannot allocate enough memory for operation!0-9^-].,;:(){}<>'=test.html~ty.html~ty.logHTMLTIDY.DLLcsevalidator.dll%%x||%%Xdocument.write(unescape("%%xShowCmdwww.serialz.to9Down.COM%A, %B %d, %Y.java\shell\print\ddeexec\shell\open\ddeexecNOTEPAD.EXE /P "%1"NOTEPAD.EXE "%1"ULTRAEDT.EXEUEDIT32.EXEFTP AccountsPasswordPassword1Save PasswordProxy PortCache PasswordPassive ModeSecure FTPKey PathKey Password Reqmy keyFTP Account -!@~_)* {}:Long Name SupportSend After LoginAuto Browse FTPFTP Connect On ChangeSFTP CompressionFTP Debug%s/%s,%s.%sFTP Dialog/qsys.lib//QSYS.LIB/www.ultraedit.com{lX-X-x-XX-XXXXXX}UXTHEME.DLLdefault.ini*.MACSelect .NET executable ....NET Executables (*.exe)|*.exe||Please select first .NET executable file you want to protect !%s: [%s] ok.error: %sfile: %shttp://download8.htmlvalidator.com/idm/csesetup.exehttp://download8.htmlvalidator.com/idm/cselite.exe%d=%sprojects.lstFiles - %s%d Seconds,%d Minutes,%d Hours,%d Days,line %d ofwarning %d in line %d oferror %d in line %d ofPass32 Assembler\winhlp32.exeLanguage %dTAGLIST.TXT(Full keying)9ACCT %sPASS %sUSER %sRETR %sPORT %s,%d,%dSTOR %sDELE %sRNTO %sRNFR %sCWD %sMKD %sRMD %sSITE chmod %d %s[password not displayed]tmp%d.tmpa|name|href=$i|hreflang|type|rel=nofollow|rev|charset|id|class|lang|dir=ltr,rtl|title|style|shape|onfocus=$f|onblur=$f|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|target=_blank,_parent,_search,_self,_top|tabindex|accesskey|abbr|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|acronym|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|address|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|area|shape|coords|nohref|usemap=$i|id|class|lang|dir=ltr,rtl|title|style|alt|href=$i|target=_blank,_parent,_self,_top|tabindex|accesskey|shape|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|onfocus=$f|onblur=$f|b|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|bdo|dir=ltr,rtl|lang|accesskey|class|id|language|tabindex|title|onclick=$f|onhelp=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|big|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|blockquote|cite=$i|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|body|background=$i|text=$c|link=$c|vlink=$c|alink=$c|id|class|lang|dir=ltr,rtl|title|target=_blank,_parent,_self,_top|style|bgcolor=$c|onload=$f|onunload=$f|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|button|name|value|type=button,submit,reset|id|lang|dir=ltr,rtl|title|style|disabled|accesskey|tabindex|onfocus=$f|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|caption|align=top,bottom,left,right|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|center|clear|id|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|cite|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|code|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|col|span|width|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|align=left,center,right,justify,char|char|charoff|valign=top,middle,bottom,baseline|colgroup|span|width|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|align=left,center,right,justify,char|char|charoff|valign=top,middle,bottom,baseline|dd|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|del|cite=$i|datetime|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|dfn|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|dir|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|div|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|dl|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|dt|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|em|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|fieldset|align=top,bottom,left,right|id|lang|dir=ltr,rtl|title|style|accesskey|onclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|form|action=$i|method=GET,POST|enctype|accept-charset|accept|name|id|lang|dir=ltr,rtl|style|title|target=_blank,_parent,_self,_top|onsubmit=$f|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|h1|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|h2|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|h3|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|h4|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|h5|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|h6|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|hr|align=left,center,right|noshade|size|width|id|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|i|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|img|src=$i|align=top,middle,bottom,left,right|longdesc|name|id|class|alt|lang|width|height|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|ismap|hspace|vspace|input|type=button,checkbox,file,hidden,image,password,radio,reset,submit,text|autocomplete=off,on|name|value|size|class|maxlength|checked|src=$i|id|lang|dir=ltr,rtl|title|style|alt|align=top,middle,bottom,left,right|accept|readonly|disabled|tabindex|accesskey|usemap=$i|ismap|onfocus=$f|onselect=$f|onchange=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|ins|cite=$i|datetime|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|kbd|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|label|for|id|lang|dir=ltr,rtl|title|style|accesskey|onfocus=$f|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|legend|class|align=top,bottom,left,right|id|lang|dir=ltr,rtl|title|style|accesskey|onclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|li|type|start|value|compact|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|link|id|class|lang|dir|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|href=$i|hreflang|type=text/css,text/javascript|rel|rev|target=_blank,_parent,_self,_top|media|charset|map|name|id|class|lang|dir=ltr,rtl|title|style|alt|href=$i|target|tabindex|accesskey|shape|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|onfocus=$f|onblur=$f|menu|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|meta|name|content|scheme|http-equiv|lang|charset|url|noframes|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|object|align=top,middle,bottom,left,right|classid=$i|codebase=$i|codetype|data=$i|type|archive|declare|standby|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|tabindex|usemap=$i|hspace|vspace|ol|type|start|value|compact|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|optgroup|name|size|multiple|disabled|tabindex|onfocus=$f|onblur=$f|onchange=$f|id|lang|dir=ltr,rtl|title|style|disabled|tabindex|onclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|option|name|size|multiple|disabled|tabindex|onfocus=$f|onblur=$f|onchange=$f|id|lang|dir=ltr,rtl|title|style|onclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|p|id|class|lang|dir=ltr,rtl|title|style|align=left,center,right,justify|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|pre|width|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|q|cite=$i|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|s|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|samp|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|select|name|size|multiple|disabled|tabindex|onfocus=$f|onblur=$f|onchange=$f|id|lang|dir=ltr,rtl|title|style|tabindex|onclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|small|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|span|id|class|lang|dir=ltr,rtl|title|style|align|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|strike|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|strong|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|sub|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|sup|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|table|border|summary|align=left,center,right|width|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|bgcolor=$c|frame|cellspacing|cellpadding|tbody|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|align=left,center,right,justify,char|char|charoff|valign=top,middle,bottom,baseline|td|headers|scope|abbr|axis|rowspan|colspan|nowrap|width|height|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|bgcolor=$c|align=left,center,right,justify,char|char|charoff|valign=top,middle,bottom,baseline|textarea|name|rows|cols|class|id|lang|dir=ltr,rtl|title|style|readonly|disabled|tabindex|onfocus=$f|onselect=$f|onchange=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|tfoot|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|align=left,center,right,justify,char|char|charoff|valign=top,middle,bottom,baseline|th|headers|scope|abbr|axis|rowspan|colspan|nowrap|width|height|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|bgcolor=$c|char|charoff|valign=top,middle,bottom,baseline|thead|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|align=left,center,right,justify,char|char|charoff|valign=top,middle,bottom,baseline|tr|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|bgcolor=$c|align=left,center,right,justify,char|char|charoff|valign=top,middle,bottom,baseline|tt|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|u|id|class|lang|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|ul|type|start|value|compact|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f|var|id|class|lang|dir=ltr,rtl|title|style|onclick=$f|ondblclick=$f|onmousedown=$f|onmouseup=$f|onmouseover=$f|onmousemove=$f|onmouseout=$f|onkeypress=$f|onkeydown=$f|onkeyup=$f||||AdminExecuteSequence|AdvtExecuteSequence|Certificate|Id|BinaryKey|CertificatePath|Overwrite=yes,no|PFXPassword|Request=yes,no|StoreLocation=currentUser,localMachine|StoreName=ca,my,request,root|Column|Id|Localizable=yes,no|Nullable=yes,no|PrimaryKey=yes,no|Type=binary,int,string|Width=$i|Component|Id|ComPlusFlags=$i|DiskId|Guid=$u|KeyPath=yes,no|Location=local,source,either|NeverOverwrite=yes,no|Permanent=yes,no|SharedDllRefCount=yes,no|Transitive=yes,no|Win64=yes,no|Control|Id|Bitmap=yes,no|Cancel=yes,no|CDROM=yes,no|CheckBoxValue|ComboList=yes,no|Default=yes,no|Disabled=yes,no|First=yes,no|Fixed=yes,no|FixedSize=yes,no|Floppy=yes,no|FormatSize=yes,no|HasBorder=yes,no|Height=$i|Help|Hidden=yes,no|Icon=yes,no|IconSize=16,32,48|Image=yes,no|Indirect=yes,no|Integer=yes,no|LeftScroll=yes,no|Multiline=yes,no|NoPrefix=yes,no|NoWrap=yes,no|Password=yes,no|ProgressBlocks=yes,no|Property|PushLike=yes,no|RAMDisk=yes,no|Remote=yes,no|Removable=yes,no|RightAligned=yes,no|RightToLeft=yes,no|ShowRollbackCost=yes,no|Sorted=yes,no|Sunken=yes,no|TabSkip=yes,no|Text|ToolTip|Transparent=yes,no|Type|UserLanguage=yes,no|Width=$i|X=$i|Y=$i|CustomAction|BinaryKey|Directory|DllEntry|Error|ExeCommand|Execute=immediate,deferred,rollback,commit,oncePerProcess,firstSequence,secondSequence|FileKey|HideTarget=yes,no|Id|Impersonate=yes,no|InstallProperties|JScriptCall|PackagePath|PackageProductCode=$u|PackageSubstorage|Property|Return=check,ignore,asyncWait,asyncNoWait|TSAware=yes,no|Value|VBScriptCall|DigitalCertificate|Name|src|File|Id|Assembly=no,win32,.net|AssemblyApplication|AssemblyManifest|AssemblyRegisterComInterop=yes,no|BindPath|Checksum=yes,no|CompanionFile|Compressed=default,yes,no|DiskId|FontTitle|Hidden=yes,no|KeyPath=yes,no|LongName=$L|Name=$S|PatchAdded=yes,no|ProcessorArchitecture=neutral,x86|ReadOnly=yes,no|SelfRegCost=$i|src|System=yes,no|TrueType=yes,no|Vital=yes,no|IniFile|Id|Action=addLine,createLine,addTag,removeLine,removeTag|Directory|Key|Name|Section|Value|IniFileSearch|Id|Field=$i|File|Key|Section|Type=directory,file,registry|InstallExecute|After|Before|Sequence=$i|InstallExecuteAgain|After|Before|Sequence=$i|InstallExecuteSequence|ODBCDataSource|Id|DriverName|KeyPath=yes,no|Name|Registration=machine,user|Package|AdminImage=yes,no|Comments|Compressed=yes,no|Description|Id=$u|InstallerVersion=$i|Keywords|Languages|Manufacturer|Platforms|ShortNames=yes,no|SummaryCodepage=$i|Permission|Append=yes,no|ChangePermission=yes,no|CreateChild=yes,no|CreateFile=yes,no|CreateLink=yes,no|CreateSubkeys=yes,no|Delete=yes,no|DeleteChild=yes,no|Domain|EnumerateSubkeys=yes,no|Execute=yes,no|GenericAll=yes,no|GenericExecute=yes,no|GenericRead=yes,no|GenericWrite=yes,no|Notify=yes,no|Read=yes,no|ReadAttributes=yes,no|ReadExtendedAttributes=yes,no|ReadPermission=yes,no|Synchronize=yes,no|TakeOwnership=yes,no|Traverse=yes,no|User|Write=yes,no|WriteAttributes=yes,no|WriteExtendedAttributes=yes,no|Registry|Id|Action=write,append,prepend,remove,removeKey|Key|KeyPath=yes,no|Name|Root=HKMU,HKCR,HKCU,HKLM,HKU|Type=string,integer,binary,expandable,multiString|Value|RegistrySearch|Id|Key|Name|Root=HKCR,HKCU,HKLM,HKU|Type=directory,file,registry|Win64=yes,no|ServiceInstall|Id|Account|Arguments|Description|DisplayName|EraseDescription=yes,no|ErrorControl=ignore,normal,critical|Interactive=yes,no|LocalGroup|Name|Password|Start=auto,demand,disabled,boot,system|Type=ownProcess,shareProcess,kernelDriver,systemDriver|Vital=yes,no|Shortcut|Id|Advertise=yes,no|Arguments|Description|Directory|Hotkey=$i|Icon|IconIndex=$i|LongName=$L|Name=$S|Show=normal,minimized,maximized|Target|WorkingDirectory|SqlDatabase|Id|ConfirmOverwrite=yes,no|ContinueOnError=yes,no|CreateOnInstall=yes,no|CreateOnUninstall=yes,no|Database|DropOnInstall=yes,no|DropOnUninstall=yes,no|Instance|Server|User|SqlScript|Id|BinaryKey|ContinueOnError=yes,no|ExecuteOnInstall=yes,no|ExecuteOnUninstall=yes,no|RollbackOnInstall=yes,no|RollbackOnUninstall=yes,no|Sequence=$i|SqlDb|User|SqlString|Id|ContinueOnError=yes,no|ExecuteOnInstall=yes,no|ExecuteOnUninstall=yes,no|RollbackOnInstall=yes,no|RollbackOnUninstall=yes,no|Sequence=$i|SQL|SqlDb|User|User|Id|CanNotChangePassword=yes,no|CreateUser=yes,no|Disabled=yes,no|Domain|FailIfExists=yes,no|Name|Password|PasswordExpired=yes,no|PasswordNeverExpires=yes,no|RemoveOnUninstall=yes,no|UpdateIfExists=yes,no|WebAddress|Id|Header|IP|KeyPath=yes,no|Port|Secure=yes,no|WebApplication|Id|AllowSessions=default,yes,no|Buffer=default,yes,no|ClientDebugging=default,yes,no|DefaultScript=VBScript,JScript|Isolation=low,medium,high|Name|ParentPaths=default,yes,no|ScriptTimeout=$i|ServerDebugging=default,yes,no|SessionTimeout=$i|WebAppPool|WebApplicationExtension|Id|CheckPath=yes,no|Executable|Script=yes,no|Verbs|WebAppPool|Id|CpuAction=none,shutdown|Identity=networkService,localService,localSystem,other|IdleTimeout=$i|MaxCpuUsage|MaxWorkerProcesses=$i|QueueLimit=$i|RecycleMinutes=$i|RecycleRequests=$i|RefreshCpu=$i|User|WebDir|Id|DirProperties|Path|WebApplication|WebSite|WebDirProperties|Id|AnonymousAccess=yes,no|AnonymousUser|AspDetailedError=yes,no|BasicAuthentication=yes,no|CacheControlCustom|CacheControlMaxAge=$i|DefaultDocuments|DigestAuthentication=yes,no|Execute=yes,no|HttpExpires|IIsControlledPassword=yes,no|Index=yes,no|LogVisits=yes,no|Read=yes,no|Script=yes,no|WindowsAuthentication=yes,no|Write=yes,no|WebError|ErrorCode=$i|Path|SubCode=$i|Type=default,file,url|WebFilter|Id|Description|Flags=$i|LoadOrder|Path|WebSite|WebProperty|Id=IIs5IsolationMode,MaxGlobalBandwidth,LogInUTF8|Value|WebServiceExtension|Id|Allow=yes,no|Description|File|Group|UIDeletable=yes,no|WebSite|Id|AutoStart=yes,no|ConfigureIfExists=yes,no|Description|Directory|DirProperties|Sequence=$i|StartOnInstall=yes,no|WebApplication|WebVirtualDir|Id|Alias|Directory|DirProperties|WebApplication|WebSite|aclui.dllactiveds.dlladvapi32.dllGetEventLogInformation@20ReportEventW@36ReportEventA@36ImpersonateNamedPipeClient@4GetWindowsAccountDomainSid@12MSChapSrvChangePassword@28MSChapSrvChangePassword2@28ElfReportEventW@48ElfReportEventA@48GetServiceKeyNameA@16GetServiceKeyNameW@16RegDeleteKeyA@8RegDeleteKeyW@8RegEnumKeyA@16RegEnumKeyW@16RegEnumKeyExA@32RegEnumKeyExW@32RegCreateKeyA@12RegCreateKeyW@12RegCreateKeyExA@36RegCreateKeyExW@36RegOverridePredefKey@8RegCloseKey@4RegFlushKey@4RegOpenKeyA@12RegOpenKeyW@12RegOpenKeyExA@20RegOpenKeyExW@20RegNotifyChangeKeyValue@20RegQueryInfoKeyA@48RegQueryInfoKeyW@48RegGetKeySecurity@16RegSetKeySecurity@12RegSaveKeyA@12RegSaveKeyW@12RegSaveKeyExA@16RegSaveKeyExW@16RegRestoreKeyA@12RegRestoreKeyW@12RegLoadKeyA@12RegLoadKeyW@12RegUnLoadKeyA@8RegUnLoadKeyW@8RegReplaceKeyA@16RegReplaceKeyW@16CryptGenKey@16CryptDeriveKey@20CryptDestroyKey@4CryptSetKeyParam@16CryptGetKeyParam@20CryptExportKey@24CryptImportKey@24CryptHashSessionKey@12CryptGetUserKey@12CryptDuplicateKey@16GetMultipleTrusteeOperationW@4GetMultipleTrusteeOperationA@4SetUserFileEncryptionKey@4FreeEncryptionCertificateHashList@4EncryptedFileKeyInfo@12FreeEncryptedFileKeyInfo@4authz.dllbdnapi.dllbignums.dllcap.dllcomctl32.dllcrtdll.dllacmdln_dllamsg_exitpipecrypt32.dllCertAddCRLContextToStore@16CertAddCTLContextToStore@16CertAddCertificateContextToStore@16CertAddEncodedCRLToStore@24CertAddEncodedCTLToStore@24CertAddEncodedCertificateToStore@24CertAddEncodedCertificateToSystemStoreA@12CertAddEncodedCertificateToSystemStoreW@12CertAddEnhancedKeyUsageIdentifier@8CertAddSerializedElementToStore@32CertAlgIdToOID@4CertCloseStore@8CertCompareCertificate@12CertCompareCertificateName@12CertCompareIntegerBlob@8CertComparePublicKeyInfo@12CertCreateCRLContext@12CertCreateCTLContext@12CertCreateCertificateContext@12CertDeleteCRLFromStore@4CertDeleteCTLFromStore@4CertDeleteCertificateFromStore@4CertDuplicateCRLContext@4CertDuplicateCTLContext@4CertDuplicateCertificateContext@4CertDuplicateStore@4CertEnumCRLContextProperties@8CertEnumCTLContextProperties@8CertEnumCTLsInStore@8CertEnumCertificateContextProperties@8CertEnumCertificatesInStore@8CertFindAttribute@12CertFindCTLInStore@24CertFindCertificateInStore@24CertFindExtension@12CertFindRDNAttr@8CertFindSubjectInCTL@20CertFreeCRLContext@4CertFreeCTLContext@4CertFreeCertificateContext@4CertGetCRLContextProperty@16CertGetCRLFromStore@16CertGetCTLContextProperty@16CertGetCertificateContextProperty@16CertGetEnhancedKeyUsage@16CertGetIntendedKeyUsage@16CertGetIssuerCertificateFromStore@16CertGetSubjectCertificateFromStore@12CertIsRDNAttrsInCertificateName@16CertNameToStrA@20CertNameToStrW@20CertOIDToAlgId@4CertOpenStore@20CertOpenSystemStoreA@8CertOpenSystemStoreW@8CertRDNValueToStrA@16CertRDNValueToStrW@16CertRemoveEnhancedKeyUsageIdentifier@8CertSaveStore@24CertSerializeCRLStoreElement@16CertSerializeCTLStoreElement@16CertSerializeCertificateStoreElement@16CertSetCRLContextProperty@16CertSetCTLContextProperty@16CertSetCertificateContextProperty@16CertSetEnhancedKeyUsage@8CertStrToNameA@28CertStrToNameW@28CertVerifyCRLRevocation@16CertVerifyCRLTimeValidity@8CertVerifyCTLUsage@28CertVerifyRevocation@28CertVerifySubjectCertificateContext@12CertVerifyTimeValidity@8CertVerifyValidityNesting@8CryptExportPublicKeyInfo@20CryptExportPublicKeyInfoEx@32CryptGetMessageCertificates@20CryptHashCertificate@28CryptHashPublicKeyInfo@28CryptImportPublicKeyInfo@16CryptImportPublicKeyInfoEx@28CryptMsgCalculateEncodedLength@24CryptMsgClose@4CryptMsgControl@16CryptMsgCountersign@16CryptMsgCountersignEncoded@28CryptMsgEncodeAndSignCTL@24CryptMsgGetAndVerifySigner@24CryptMsgGetParam@20CryptMsgOpenToDecode@24CryptMsgOpenToEncode@24CryptMsgSignCTL@28CryptMsgUpdate@16CryptMsgVerifyCountersignatureEncoded@28CryptSignAndEncodeCertificate@36CryptSignCertificate@36CryptSignMessageWithKey@20CryptVerifyCertificateSignature@20CryptVerifyMessageSignatureWithKey@24RegCreateKeyExU@36RegQueryInfoKeyU@48cryptnet.dllCryptRetrieveObjectByUrlA@36CryptRetrieveObjectByUrlW@36CryptGetObjectUrl@32cryptui.dllCryptUIDlgViewCertificateW@8CryptUIDlgViewCertificateA@8CryptUIDlgViewCertificatePropertiesW@8CryptUIDlgViewCertificatePropertiesA@8CryptUIGetCertificatePropertiesPagesW@16CryptUIGetCertificatePropertiesPagesA@16CryptUIFreeCertificatePropertiesPagesW@8CryptUIFreeCertificatePropertiesPagesA@8CryptUIDlgSelectCertificateW@4CryptUIDlgSelectCertificateA@4CryptUIDlgCertMgr@4CryptUIStartCertMgr@16CryptUIWizCertRequest@24CryptUIWizImport@20CryptUIWizExport@20CryptUIWizCreateCertRequestNoDS@16CryptUIWizSubmitCertRequestNoDS@24CryptUIWizFreeCertRequestNoDS@4CryptUIWizQueryCertRequestNoDS@8CryptUIDlgSelectCertificateFromStore@28ctl3d32.dlld3d8.dlld3dim.dlld3drm.dlld3dx8d.dlld3dxof.dlldapi.dllBatchExportA@4BatchExportW@4BatchImportA@4BatchImportW@4NTExportA@4NTExportW@4NWExportA@4NWExportW@4dbghelp.dllIMPORT_DESCRIPTOR_dbghelpFindExecutableImage@12FindExecutableImageEx@20ddraw.dlldflayout.dlldinput.dlldinput8.dllc_dfDIKeyboarddlcapi.dlldplay.dlldplayx.dlldpvoice.dlldsetup.dlldsound.dlldsuiext.dllFormatMsgResourceFormatMsgBoxdxerr.dlldynloader.dlledbbcli.dllgc.dllgdi32.dllGetViewportExtEx@8GetViewportOrgEx@8OffsetViewportOrgEx@16ScaleViewportExtEx@24SetViewportExtEx@16SetViewportOrgEx@16UpdateICMRegKeyA@16UpdateICMRegKeyW@16gdiplus.dllGdiplusShutdown@4GdipSetStringFormatHotkeyPrefix@8GdipSetPenLineJoin@8GdipSetImageAttributesColorKeys@20GdipSetCustomLineCapStrokeJoin@8GdipGetStringFormatHotkeyPrefix@8GdipGetPenLineJoin@8GdipGetCustomLineCapStrokeJoin@8glide2x.dllgrChromakeyMode@4grChromakeyValue@4grSstConfigPipeline@12glu32.dllglutExtensionSupported@4glutInitWindowSize@8glutKeyboardFunc@4glutPassiveMotionFunc@4glutReportErrors@0glutWindowStatusFunc@4hlink.dllHlinkIsShortcut@4HlinkTranslateURL@12httpapi.dllHttpAddUrl@12HttpRemoveUrl@8HttpCreateHttpHandle@8HttpReceiveHttpRequest@32HttpReceiveRequestEntityBody@32HttpSendHttpResponse@44HttpSendResponseEntityBody@44HttpWaitForDisconnect@16HttpInitializeServerContext@28HttpSendHttpRequest@48HttpSendRequestEntityBody@28HttpReceiveHttpResponse@40HttpSetServerContextInformation@20HttpQueryServerContextInformation@32HttpCancelHttpRequest@20HttpInitialize@12HttpTerminate@8HttpOpenControlChannel@8HttpQueryControlChannelInformation@20HttpSetControlChannelInformation@16HttpCreateConfigGroup@8HttpDeleteConfigGroup@12HttpAddUrlToConfigGroup@24HttpRemoveUrlFromConfigGroup@16HttpQueryConfigGroupInformation@28HttpSetConfigGroupInformation@24HttpCreateFilter@16HttpOpenFilter@12HttpShutdownFilter@4HttpFilterAccept@20HttpFilterClose@16HttpFilterRawRead@28HttpFilterAppWriteAndRawRead@12HttpFilterRawWrite@28HttpFilterAppRead@28HttpFilterRawWriteAndAppRead@12HttpFilterAppWrite@28HttpCreateAppPool@16HttpOpenAppPool@12HttpShutdownAppPool@4HttpQueryAppPoolInformation@20HttpSetAppPoolInformation@16HttpFlushResponseCache@16HttpWaitForDemandStart@20HttpRemoveAllUrlsFromConfigGroup@12HttpReceiveClientCertificate@32HttpGetCounters@20HttpAddFragmentToCache@20HttpReadFragmentFromCache@28HttpQueryServiceConfiguration@32HttpSetServiceConfiguration@20HttpDeleteServiceConfiguration@20icm32.dllCMDeleteTransform@4icmp.dllicmui.dllimagehlp.dllImageAddCertificate@12ImageEnumerateCertificates@20ImageGetCertificateData@16ImageGetCertificateHeader@12ImageRemoveCertificate@8imm32.dllImmGetHotKey@16ImmSetHotKey@16ImmSimulateHotKey@8ImmGetVirtualKey@4ImmCreateSoftKeyboard@16ImmDestroySoftKeyboard@4ImmShowSoftKeyboard@8iphlpapi.dllGetTcpTable@12GetUdpTable@12GetTcpStatistics@4GetUdpStatistics@4SetTcpEntry@4InternalGetTcpTable@12InternalGetUdpTable@12InternalSetTcpEntry@4AllocateAndGetTcpTableFromStack@16AllocateAndGetUdpTableFromStack@16GetTcpTableFromStack@12SetTcpEntryToStack@4GetUdpTableFromStack@12GetUdpStatsFromStack@4GetTcpStatsFromStack@4iprop.dllirprops.dllCallNamedPipeA@28CallNamedPipeW@28ConnectNamedPipe@8CreateIoCompletionPort@16CreateNamedPipeA@32CreateNamedPipeW@32CreatePipe@16DisconnectNamedPipe@4GetCPInfo@8GetCPInfoExA@12GetCPInfoExW@12GetConsoleOutputCP@0GetLargestConsoleWindowSize@4GetNamedPipeHandleStateA@28GetNamedPipeHandleStateW@28GetNamedPipeInfo@20GetProcessHeap@0GetProcessHeaps@8GetProcessShutdownParameters@8GetSystemWindowsDirectoryA@8GetSystemWindowsDirectoryW@8GetWindowsDirectoryA@8GetWindowsDirectoryW@8PeekNamedPipe@24SetConsoleOutputCP@4SetNamedPipeHandleState@16SetProcessShutdownParameters@8SetThreadExecutionState@4TransactNamedPipe@28WaitNamedPipeA@8WaitNamedPipeW@8WinExec@8lcclibc.dllloadperf.dlllsapi32.dlllz32.dllmapi32.dllCloseIMsgSession@4GetAttribIMsgOnIStg@12HrComposeMsgID@24HrDecomposeMsgID@24OpenIMsgOnIStg@44OpenIMsgSession@12SetAttribIMsgOnIStg@16mgmtapi.dllmpr.dllWNetPasswordChangeNotify@32WNetSupportGlobalEnum@4mprapi.dllMprAdminInterfaceTransportAdd@20MprAdminInterfaceTransportRemove@12MprAdminInterfaceTransportGetInfo@20MprAdminInterfaceTransportSetInfo@20MprAdminTransportSetInfo@24MprAdminTransportGetInfo@24MprConfigTransportCreate@36MprConfigTransportDelete@8MprConfigTransportGetHandle@12MprConfigTransportSetInfo@28MprConfigTransportGetInfo@28MprConfigTransportEnum@28MprConfigInterfaceTransportAdd@28MprConfigInterfaceTransportRemove@12MprConfigInterfaceTransportGetHandle@16MprConfigInterfaceTransportGetInfo@20MprConfigInterfaceTransportSetInfo@20MprConfigInterfaceTransportEnum@32MprAdminPortEnum@32MprAdminPortGetInfo@16MprAdminPortClearStats@8MprAdminPortDisconnect@8MprAdminPortReset@8msacm32.dllacmDriverAddA@20acmDriverAddW@20acmDriverClose@8acmDriverDetailsA@12acmDriverDetailsW@12acmDriverEnum@12acmDriverID@12acmDriverMessage@16acmDriverOpen@12acmDriverPriority@12acmDriverRemove@8mscms.dllmsi.dllMsiViewExecute@8MsiDatabaseGetPrimaryKeysA@12MsiDatabaseGetPrimaryKeysW@12MsiDatabaseImportA@12MsiDatabaseImportW@12MsiDatabaseExportA@16MsiDatabaseExportW@16msimg32.dllmslsp32.dllmsvcrt.dllcrtCompareStringAcrtGetLocaleInfoWcrtLCMapStringAacmdlnwcmdlnwexeclwexeclewexeclpwexeclpewexecvwexecvewexecvpwexecvpemsvcrtd.dllp__wcmdlnp__crtDbgFlagp__crtBreakAllocp__crtAssertBusyp__acmdlnCrtSetReportModeCrtSetReportHookCrtSetReportFileCrtSetDumpClientCrtSetDbgFlagCrtSetDbgBlockTypeCrtSetBreakAllocCrtSetAllocHookCrtMemDumpStatisticsCrtMemDumpAllObjectsSinceCrtMemDifferenceCrtMemCheckpointCrtIsValidPointerCrtIsValidHeapPointerCrtIsMemoryBlockCrtDumpMemoryLeaksCrtDoForAllClientObjectsCrtDbgReportCrtDbgBreakCrtCheckMemorywWinMainCRTStartupwmainCRTStartupWinMainCRTStartupmainCRTStartupCRT_INIT@12DllMainCRTStartup@12msvfw32.dllVideoForWindowsVersion@0mswsock.dllrcmd@24rexec@24rresvport@4nal.dllnddeapi.dllnetapi32.dllDsRoleGetDcOperationProgress@12DsRoleGetDcOperationResults@12I_NetServerPasswordGet@28I_NetServerPasswordSet@28I_NetServerPasswordSet2@28I_NetDfsManagerReportSiteInfo@8RxNetUserPasswordSet@16NetGetJoinableOUs@24NetGetJoinInformation@12NetJoinDomain@24NetpUpgradePreNT5JoinInfo@0NetpAssertFailed@16NetRemoteComputerSupports@12NetReplExportDirAdd@16NetReplExportDirDel@8NetReplExportDirEnum@28NetReplExportDirGetInfo@16NetReplExportDirSetInfo@20NetReplExportDirLock@8NetReplExportDirUnlock@12NetReplImportDirAdd@16NetReplImportDirDel@8NetReplImportDirEnum@28NetReplImportDirGetInfo@16NetReplImportDirLock@8NetReplImportDirUnlock@12NetServerTransportAdd@12NetServerTransportAddEx@12NetServerTransportDel@12NetServerTransportEnum@28NetUnjoinDomain@16NetUserChangePassword@16NetWkstaTransportAdd@16NetWkstaTransportDel@12NetWkstaTransportEnum@28netsh.dllMatchCmdLine@16MatchTagsInCmdLine@28ntdll.dllDbgSsHandleKmApiMsg@8LdrQueryImageFileExecutionOptions@24NtAcceptConnectPort@24NtCompleteConnectPort@4NtConnectPort@32NtCreateKey@28NtCreateNamedPipeFile@56NtCreatePort@20NtDelayExecution@8NtDeleteKey@4NtDeleteValueKey@8NtEnumerateKey@24NtEnumerateValueKey@24NtFlushKey@4NtImpersonateClientOfPort@8NtListenPort@8NtLoadKey2@12NtLoadKey@8NtNotifyChangeKey@40NtOpenKey@12NtQueryInformationPort@20NtQueryKey@20NtQueryMultipleValueKey@24NtQueryValueKey@24NtRegisterThreadTerminatePort@4NtReplaceKey@12NtReplyPort@8NtReplyWaitReceivePort@16NtReplyWaitReplyPort@8NtRequestPort@8NtRequestWaitReplyPort@12NtRestoreKey@12NtSaveKey@8NtSetDefaultHardErrorPort@4NtSetInformationKey@16NtSetValueKey@24NtUnloadKey@4NtYieldExecution@0RtlCheckRegistryKey@8RtlCreateRegistryKey@8RtlEnumProcessHeaps@8RtlFormatCurrentUserKeyPath@4RtlGetProcessHeaps@8RtlQueryProcessHeapInformation@4RtlValidateProcessHeaps@0RtlpNtCreateKey@24RtlpNtEnumerateSubKey@16RtlpNtMakeTemporaryKey@4RtlpNtOpenKey@16RtlpNtQueryValueKey@20RtlpNtSetValueKey@16ZwAcceptConnectPort@24ZwCompleteConnectPort@4ZwConnectPort@32ZwCreateKey@28ZwCreateNamedPipeFile@56ZwCreatePort@20ZwDelayExecution@8ZwDeleteKey@4ZwDeleteValueKey@8ZwEnumerateKey@24ZwEnumerateValueKey@24ZwFlushKey@4ZwImpersonateClientOfPort@8ZwListenPort@8ZwLoadKey2@12ZwLoadKey@8ZwNotifyChangeKey@40ZwOpenKey@12ZwQueryInformationPort@20ZwQueryKey@20ZwQueryMultipleValueKey@24ZwQueryValueKey@24ZwRegisterThreadTerminatePort@4ZwReplaceKey@12ZwReplyPort@8ZwReplyWaitReceivePort@16ZwReplyWaitReplyPort@8ZwRequestPort@8ZwRequestWaitReplyPort@12ZwRestoreKey@12ZwSaveKey@8ZwSetDefaultHardErrorPort@4ZwSetInformationKey@16ZwSetValueKey@24ZwUnloadKey@4ZwYieldExecution@0ntmsapi.dllSubmitNtmsOperatorRequestW@24SubmitNtmsOperatorRequestA@24WaitForNtmsOperatorRequest@12CancelNtmsOperatorRequest@8SatisfyNtmsOperatorRequest@8ExportNtmsDatabase@4ImportNtmsDatabase@4query.dllodbc32.dllSQLAllocConnect@8SQLAllocEnv@4SQLAllocStmt@8SQLBindCol@24SQLCancel@4SQLColAttributes@28SQLColAttributesW@28SQLColAttributesA@28SQLConnect@28SQLConnectW@28SQLConnectA@28SQLDescribeCol@36SQLDescribeColW@36SQLDescribeColA@36SQLDisconnect@4SQLError@32SQLErrorW@32SQLErrorA@32SQLExecDirect@12SQLExecDirectW@12SQLExecDirectA@12SQLExecute@4SQLFetch@4SQLFreeConnect@4SQLFreeEnv@4SQLFreeStmt@8SQLGetCursorName@16SQLGetCursorNameW@16SQLGetCursorNameA@16SQLNumResultCols@8SQLPrepare@12SQLPrepareW@12SQLPrepareA@12SQLRowCount@8SQLSetCursorName@12SQLSetCursorNameW@12SQLSetCursorNameA@12SQLSetParam@32SQLTransact@12SQLColumns@36SQLColumnsW@36SQLColumnsA@36SQLDriverConnect@32SQLDriverConnectW@32SQLDriverConnectA@32SQLGetConnectOption@12SQLGetConnectOptionW@12SQLGetConnectOptionA@12SQLGetData@24SQLGetFunctions@12SQLGetInfo@20SQLGetInfoW@20SQLGetInfoA@20SQLGetStmtOption@12SQLGetTypeInfo@8SQLGetTypeInfoW@8SQLGetTypeInfoA@8SQLParamData@8SQLPutData@12SQLSetConnectOption@12SQLSetConnectOptionW@12SQLSetConnectOptionA@12SQLSetStmtOption@12SQLSpecialColumns@40SQLSpecialColumnsW@40SQLSpecialColumnsA@40SQLStatistics@36SQLStatisticsW@36SQLStatisticsA@36SQLTables@36SQLTablesW@36SQLTablesA@36SQLBrowseConnect@24SQLBrowseConnectW@24SQLBrowseConnectA@24SQLColumnPrivileges@36SQLColumnPrivilegesW@36SQLColumnPrivilegesA@36SQLDataSources@32SQLDataSourcesW@32SQLDataSourcesA@32SQLDescribeParam@24SQLExtendedFetch@20SQLForeignKeys@52SQLForeignKeysW@52SQLForeignKeysA@52SQLMoreResults@4SQLNativeSql@24SQLNativeSqlW@24SQLNativeSqlA@24SQLNumParams@8SQLParamOptions@12SQLPrimaryKeys@28SQLPrimaryKeysW@28SQLPrimaryKeysA@28SQLProcedureColumns@36SQLProcedureColumnsW@36SQLProcedureColumnsA@36SQLProcedures@28SQLProceduresW@28SQLProceduresA@28SQLSetPos@16SQLSetScrollOptions@16SQLTablePrivileges@28SQLTablePrivilegesW@28SQLTablePrivilegesA@28SQLDrivers@32SQLDriversW@32SQLDriversA@32SQLBindParameter@40SQLAllocHandle@12SQLBindParam@32SQLCloseCursor@4SQLColAttribute@28SQLColAttributeW@28SQLColAttributeA@28SQLCopyDesc@8SQLEndTran@12SQLFetchScroll@12SQLFreeHandle@8SQLGetConnectAttr@20SQLGetConnectAttrW@20SQLGetConnectAttrA@20SQLGetDescField@24SQLGetDescFieldW@24SQLGetDescFieldA@24SQLGetDescRec@44SQLGetDescRecW@44SQLGetDescRecA@44SQLGetDiagField@28SQLGetDiagFieldW@28SQLGetDiagFieldA@28SQLGetDiagRec@32SQLGetDiagRecW@32SQLGetDiagRecA@32SQLGetEnvAttr@20SQLGetStmtAttr@20SQLGetStmtAttrW@20SQLGetStmtAttrA@20SQLSetConnectAttr@16SQLSetConnectAttrW@16SQLSetConnectAttrA@16SQLSetDescField@20SQLSetDescFieldW@20SQLSetDescFieldA@20SQLSetDescRec@40SQLSetEnvAttr@16SQLSetStmtAttr@16SQLSetStmtAttrW@16SQLSetStmtAttrA@16SQLAllocHandleStd@12SQLBulkOperations@8odbcbcp.dllbcp_exec@8SQLLinkedServers@4SQLLinkedCatalogsW@12SQLLinkedCatalogsA@12SQLInitEnumServers@8SQLGetNextEnumeration@12SQLCloseEnumServers@4odbccp32.dllSQLConfigDataSource@16SQLConfigDataSourceW@16SQLConfigDriver@28SQLConfigDriverW@28SQLCreateDataSource@8SQLCreateDataSourceW@8SQLGetAvailableDrivers@16SQLGetAvailableDriversW@16SQLGetConfigMode@4SQLGetInstalledDrivers@12SQLGetInstalledDriversW@12SQLGetPrivateProfileString@24SQLGetPrivateProfileStringW@24SQLGetTranslator@32SQLGetTranslatorW@32SQLInstallDriver@20SQLInstallDriverEx@28SQLInstallDriverExW@28SQLInstallDriverManager@12SQLInstallDriverManagerW@12SQLInstallDriverW@20SQLInstallODBC@16SQLInstallODBCW@16SQLInstallTranslator@32SQLInstallTranslatorEx@28SQLInstallTranslatorExW@28SQLInstallTranslatorW@32SQLInstallerError@20SQLInstallerErrorW@20SQLManageDataSources@4SQLPostInstallerError@8SQLPostInstallerErrorW@8SQLReadFileDSN@24SQLReadFileDSNW@24SQLRemoveDSNFromIni@4SQLRemoveDSNFromIniW@4SQLRemoveDefaultDataSource@0SQLRemoveDriver@12SQLRemoveDriverManager@4SQLRemoveDriverW@12SQLRemoveTranslator@8SQLRemoveTranslatorW@8SQLSetConfigMode@4SQLValidDSN@4SQLValidDSNW@4SQLWriteDSNToIni@8SQLWriteDSNToIniW@8SQLWriteFileDSN@16SQLWriteFileDSNW@16SQLWritePrivateProfileString@16SQLWritePrivateProfileStringW@16oleacc.dlloleaut32.dllUserMSG_free_inst@4UserMSG_free_local@4UserMSG_from_local@8UserMSG_to_local@8olepro32.dllopengl.dllglGetTexEnvfv@12glGetTexEnviv@12glPassThrough@4glTexEnvf@12glTexEnvfv@12glTexEnvi@12glTexEnviv@12glViewport@16opengl32.dllpdh.dllPdhVerifySQLDBA@4PdhVerifySQLDBW@4PdhCreateSQLTablesA@4PdhCreateSQLTablesW@4penwin32.dllProcessHRC@8pkdp32.dllpowrprof.dllpsapi.dllqfloat.dllrasapi32.dllRasGetHport@4RasSetOldPassword@8rasdlg.dllrassapi.dllRasAdminPortClearStatistics@8RasAdminPortDisconnect@8RasAdminPortEnum@12RasAdminPortGetInfo@20resutils.dllriched20.dllrpcns4.dllRpcNsBindingExportW@20RpcNsBindingExportA@20RpcNsBindingUnexportW@16RpcNsBindingUnexportA@16RpcNsBindingImportBeginW@20RpcNsBindingImportBeginA@20RpcNsBindingImportNext@8RpcNsBindingImportDone@4RpcNsMgmtBindingUnexportA@20RpcNsMgmtBindingUnexportW@20RpcNsBindingExportPnPW@16RpcNsBindingExportPnPA@16RpcNsBindingUnexportPnPW@16RpcNsBindingUnexportPnPA@16rpcrt4.dllCStdStubBuffer_IsIIDSupported@8I_RpcBindingInqTransportType@8I_RpcFreePipeBuffer@4I_RpcNsInterfaceExported@12I_RpcNsInterfaceUnexported@12I_RpcPauseExecution@4I_RpcReallocPipeBuffer@8I_RpcServerAllocateIpPort@8I_RpcServerInqTransportType@4NdrCorrelationPass@4NdrGetPipeBuffer@12NdrIsAppDoneWithPipes@4NdrMarkNextActivePipe@4NdrPipePull@16NdrPipePush@12NdrPipeSendReceive@8NdrPipesInitialize@24NdrPipesDone@4RpcCertGeneratePrincipalNameA@12RpcCertGeneratePrincipalNameW@12rtm.dllsecur32.dllExportSecurityContext@16ImportSecurityContextA@16ImportSecurityContextW@16setupapi.dllSetupDiCreateDevRegKeyA@28SetupDiCreateDevRegKeyW@28SetupDiDeleteDevRegKey@20SetupDiOpenClassRegKey@8SetupDiOpenDevRegKey@24sfc.dllshell32.dllWOWShellExecute@28ShellExecuteW@24ShellExecuteExW@4ShellExecuteExA@4ShellExecuteEx@4ShellExecuteA@24SHFileOperationW@4SHFileOperationA@4SHFileOperation@4RealShellExecuteW@40RealShellExecuteExW@44RealShellExecuteExA@44RealShellExecuteA@40PathIsExe@4FindExecutableW@12FindExecutableA@12FindExeDlgProc@16shfolder.dllshlwapi.dllPathIsURLA@4PathIsURLW@4SHDeleteOrphanKeyA@8SHDeleteOrphanKeyW@8SHDeleteEmptyKeyA@8SHDeleteEmptyKeyW@8SHDeleteKeyA@8SHDeleteKeyW@8SHEnumKeyExA@16SHEnumKeyExW@16SHQueryInfoKeyA@20SHQueryInfoKeyW@20SHRegOpenUSKeyA@20SHRegOpenUSKeyW@20SHRegCreateUSKeyA@20SHRegCreateUSKeyW@20SHRegEnumUSKeyA@20SHRegEnumUSKeyW@20SHRegQueryInfoUSKeyA@24SHRegQueryInfoUSKeyW@24SHRegDeleteEmptyUSKeyA@12SHRegDeleteEmptyUSKeyW@12SHRegCloseUSKey@4SHCopyKeyA@16SHCopyKeyW@16SHRegDuplicateHKey@4AssocQueryStringByKeyW@24AssocQueryStringByKeyA@24AssocQueryKeyW@20AssocQueryKeyA@20UrlCompareA@12UrlCompareW@12UrlCombineA@20UrlCombineW@20UrlCanonicalizeA@16UrlCanonicalizeW@16UrlIsOpaqueA@4UrlIsOpaqueW@4UrlIsNoHistoryA@4UrlIsNoHistoryW@4UrlIsA@8UrlIsW@8UrlGetLocationA@4UrlGetLocationW@4UrlUnescapeA@16UrlUnescapeW@16UrlEscapeA@16UrlEscapeW@16UrlCreateFromPathA@16UrlCreateFromPathW@16PathCreateFromUrlA@16PathCreateFromUrlW@16UrlHashA@12UrlHashW@12UrlGetPartA@20UrlGetPartW@20UrlApplySchemeA@16UrlApplySchemeW@16wsnmp32.dllSnmpSendMsg@20SnmpRecvMsg@20SnmpCancelMsg@8SnmpSetPort@8SnmpEncodeMsg@24SnmpDecodeMsg@24snmpapi.dllSnmpSvcReportEvent@16SnmpUtilVarBindListCpy@8strlib.dllsvrapi.dlltapi32.dlltoolbar.dlltoolhelp.dlltraffic.dllurl.dllTranslateURLA@12TranslateURLW@12URLAssociationDialogA@24URLAssociationDialogW@24urlmon.dllUrlMkBuildVersion@0CreateURLMoniker@12CreateURLMonikerEx@16GetClassURL@8IsValidURL@12UrlMkSetSessionOption@16UrlMkGetSessionOption@20CoGetClassObjectFromURL@40CoInternetParseUrl@28CoInternetCombineUrl@28CoInternetCompareUrl@12CoInternetGetSecurityUrl@16URLDownloadW@20URLDownloadA@20URLOpenPullStreamA@16URLOpenPullStreamW@16URLDownloadToFileA@20URLDownloadToFileW@20URLDownloadToCacheFileA@24URLDownloadToCacheFileW@24URLOpenBlockingStreamA@20URLOpenBlockingStreamW@20URLOpenStreamA@16URLOpenStreamW@16RegisterHotKey@16UnregisterHotKey@8EnumWindows@8EnumChildWindows@12EnumThreadWindows@12CreateDialogIndirectParamA@20CreateDialogIndirectParamW@20LoadKeyboardLayoutA@8LoadKeyboardLayoutW@8ActivateKeyboardLayout@8UnloadKeyboardLayout@4GetKeyboardLayoutNameA@4GetKeyboardLayoutNameW@4GetKeyState@4GetAsyncKeyState@4GetKeyboardState@4SetKeyboardState@4GetKeyNameTextA@12GetKeyNameTextW@12GetKeyboardType@4VkKeyScanA@4VkKeyScanW@4MapVirtualKeyA@8MapVirtualKeyW@8OemKeyScan@4MsgWaitForMultipleObjects@20MsgWaitForMultipleObjectsEx@20EnumWindowStationsA@8EnumWindowStationsW@8EnumDesktopWindows@12CreateWindowStationA@16CreateWindowStationW@16OpenWindowStationA@12OpenWindowStationW@12CloseWindowStation@4SetProcessWindowStation@4GetProcessWindowStation@0SetWindowsHookA@8SetWindowsHookW@8UnhookWindowsHook@8SetWindowsHookExA@16SetWindowsHookExW@16UnhookWindowsHookEx@4CallMsgFilterA@8CallMsgFilterW@8CallMsgFilter@8ArrangeIconicWindows@4CascadeChildWindows@8TileChildWindows@8ExitWindowsEx@8keybd_event@16CascadeWindows@20GetKeyboardLayout@4GetKeyboardLayoutList@8MapVirtualKeyExA@12MapVirtualKeyExW@12TileWindows@20VkKeyScanExA@8VkKeyScanExW@8WINNLSGetIMEHotkey@4userenv.dlluxtheme.dllversion.dllwebpost.dllwin32spl.dllwinfax.dllFaxEnumPortsA@12FaxEnumPortsW@12FaxGetPortA@8FaxGetPortW@8FaxOpenPort@16FaxSetPortA@8FaxSetPortW@8winhttp.dllWinHttpTimeFromSystemTime@8WinHttpTimeToSystemTime@8WinHttpCrackUrl@16WinHttpCreateUrl@16WinHttpCheckPlatform@0WinHttpGetDefaultProxyConfiguration@4WinHttpSetDefaultProxyConfiguration@4WinHttpDetectAutoProxyConfigUrl@8WinHttpGetProxyForUrl@16WinHttpGetIEProxyConfigForCurrentUser@4WinHttpOpen@20WinHttpSetStatusCallback@16WinHttpSetOption@16WinHttpQueryOption@16WinHttpConnect@16WinHttpOpenRequest@28WinHttpAddRequestHeaders@16WinHttpSetCredentials@24WinHttpSendRequest@28WinHttpWriteData@16WinHttpReceiveResponse@8WinHttpQueryHeaders@24WinHttpQueryAuthSchemes@16WinHttpQueryDataAvailable@8WinHttpReadData@16WinHttpCloseHandle@4WinHttpSetTimeouts@20WinHttpAutoProxySvcMain@8wininet.dllCommitUrlCacheEntryA@44CommitUrlCacheEntryW@44CreateUrlCacheContainerA@32CreateUrlCacheContainerW@32CreateUrlCacheEntryA@20CreateUrlCacheEntryW@20CreateUrlCacheGroup@8DeleteUrlCacheContainerA@8DeleteUrlCacheContainerW@8DeleteUrlCacheEntry@4DeleteUrlCacheEntryA@4DeleteUrlCacheEntryW@4DeleteUrlCacheGroup@16ExportCookieFileA@8ExportCookieFileW@8FindCloseUrlCache@4FindFirstUrlCacheContainerA@16FindFirstUrlCacheContainerW@16FindFirstUrlCacheEntryA@12FindFirstUrlCacheEntryExA@40FindFirstUrlCacheEntryExW@40FindFirstUrlCacheEntryW@12FindFirstUrlCacheGroup@24FindNextUrlCacheContainerA@12FindNextUrlCacheContainerW@12FindNextUrlCacheEntryA@12FindNextUrlCacheEntryExA@24FindNextUrlCacheEntryExW@24FindNextUrlCacheEntryW@12FindNextUrlCacheGroup@12FreeUrlCacheSpaceA@12FreeUrlCacheSpaceW@12FtpCommandA@24FtpCommandW@24FtpCreateDirectoryA@8FtpCreateDirectoryW@8FtpDeleteFileA@8FtpDeleteFileW@8FtpFindFirstFileA@20FtpFindFirstFileW@20FtpGetCurrentDirectoryA@12FtpGetCurrentDirectoryW@12FtpGetFileA@28FtpGetFileEx@28FtpGetFileSize@8FtpGetFileW@28FtpOpenFileA@20FtpOpenFileW@20FtpPutFileA@20FtpPutFileEx@20FtpPutFileW@20FtpRemoveDirectoryA@8FtpRemoveDirectoryW@8FtpRenameFileA@12FtpRenameFileW@12FtpSetCurrentDirectoryA@8FtpSetCurrentDirectoryW@8GetUrlCacheConfigInfoA@12GetUrlCacheConfigInfoW@12GetUrlCacheEntryInfoA@12GetUrlCacheEntryInfoExA@28GetUrlCacheEntryInfoExW@28GetUrlCacheEntryInfoW@12GetUrlCacheGroupAttributeA@28GetUrlCacheGroupAttributeW@28GetUrlCacheHeaderData@8HttpAddRequestHeadersA@16HttpAddRequestHeadersW@16HttpCheckDavCompliance@20HttpCheckDavComplianceA@20HttpCheckDavComplianceW@20HttpEndRequestA@16HttpEndRequestW@16HttpOpenRequestA@32HttpOpenRequestW@32HttpQueryInfoA@20HttpQueryInfoW@20HttpSendRequestA@20HttpSendRequestExA@20HttpSendRequestExW@20HttpSendRequestW@20ImportCookieFileA@4ImportCookieFileW@4IncrementUrlCacheHeaderData@8InternetCanonicalizeUrlA@16InternetCanonicalizeUrlW@16InternetCombineUrlA@20InternetCombineUrlW@20InternetCrackUrlA@16InternetCrackUrlW@16InternetCreateUrlA@16InternetCreateUrlW@16InternetGetCertByURL@12InternetGetCertByURLA@12InternetOpenUrlA@24InternetOpenUrlW@24InternetShowSecurityInfoByURL@8InternetShowSecurityInfoByURLA@8InternetShowSecurityInfoByURLW@8IsHostInProxyBypassList@12IsUrlCacheEntryExpiredA@12IsUrlCacheEntryExpiredW@12LoadUrlCacheContent@0ParseX509EncodedCertificateForListBoxEntry@16PerformOperationOverUrlCacheA@40ReadUrlCacheEntryStream@20RegisterUrlCacheNotification@24RetrieveUrlCacheEntryFileA@16RetrieveUrlCacheEntryFileW@16RetrieveUrlCacheEntryStreamA@20RetrieveUrlCacheEntryStreamW@20RunOnceUrlCache@16SetUrlCacheConfigInfoA@8SetUrlCacheConfigInfoW@8SetUrlCacheEntryGroup@28SetUrlCacheEntryGroupA@28SetUrlCacheEntryGroupW@28SetUrlCacheEntryInfoA@12SetUrlCacheEntryInfoW@12SetUrlCacheGroupAttributeA@24SetUrlCacheGroupAttributeW@24SetUrlCacheHeaderData@8ShowClientAuthCerts@4ShowX509EncodedCertificate@12UnlockUrlCacheEntryFile@8UnlockUrlCacheEntryFileA@8UnlockUrlCacheEntryFileW@8UnlockUrlCacheEntryStream@8UpdateUrlCacheContentPath@4winmm.dllmciExecute@4midiOutLongMsg@12midiOutShortMsg@8EnumPortsA@24EnumPortsW@24AddPortA@12AddPortW@12ConfigurePortA@12ConfigurePortW@12DeletePortA@12DeletePortW@12AddPortExW@16AddPortExA@16SetPortA@16SetPortW@16EnumPrinterKeyA@20EnumPrinterKeyW@20DeletePrinterKeyA@8DeletePrinterKeyW@8GetPrinterWebInformation@16wintrust.dllWinSubmitCertificate@4wldap32.dllldap_extended_operationldap_extended_operationAldap_extended_operationWldap_msgfreeldap_conn_from_msgldap_extended_operation_sWldap_extended_operation_sAwow32.dllws2_32.dllgetservbyport@8WSAAsyncGetServByPort@24WSAJoinLeaf@32wsock32.dllGETXBYYSP_WSAAsyncGetServByPort@24GETXBYYSP_getservbyport@8wst.dllwtsapi32.dllWTSShutdownSystem@8zlib.dll.?AVCCmdTarget@@.?AVCCmdUI@@.?AVCTestCmdUI@@.PAVCUserException@@.PAVCArchiveException@@.PAVCObject@@.PAVCSimpleException@@.PAVCResourceException@@.?AVCToolCmdUI@@.?AVCMDIFrameWnd@@.?AVCMDIChildWnd@@.PAVCMemoryException@@.PAVCNotSupportedException@@.?AVCNotSupportedException@@.?AVCStatusCmdUI@@.PAVCOleException@@.PAVCOleDispatchException@@zcÁ%d.%m.%Y%Documents and Settings%\%current user%\Application Data\IDMComp\UltraEdit\%Documents and Settings%\%current user%\Application Data\IDMComp\UltraEdit\uedit32.INIC:\TOTALCMD\UE\uedit32.exeKeywordsC KeywordsOperatorsOPERATORS type="win32" name="uedit32.exe"/>name="Microsoft.Windows.Common-Controls" version="6.0.0.0"publicKeyToken="6595b64144ccf1df" language="*"373333737037??804111|111\11111151111112111111#111211121112111111811133333335*,.88, #***[***2%%Xwin7.exe_316:
.text`.rdata@.data.rsrct(j.Xj\fSSShtxB^SShqPlease contact the application's support team for more information.- Attempt to initialize the CRT more than once.- CRT not initialized- floating point support not loadedoperatorGetProcessWindowStationUSER32.DLLd:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdbCOMCTL32.dllSHLWAPI.dllGetCPInfoKERNEL32.dllUSER32.dllGDI32.dllCOMDLG32.dllRegCloseKeyRegCreateKeyExWRegOpenKeyExWADVAPI32.dllSHFileOperationWShellExecuteExWSHELL32.dllole32.dllOLEAUT32.dllGetConsoleOutputCPWINRAR.SFXC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\win7.exe:(,4;<=>;?@3,456578798888888888887version="1.0.0.0" name="Microsoft.Windows.Common-Controls"version="6.0.0.0"publicKeyToken="6595b64144ccf1df"Maximum allowed array size (%u) is exceeded%.*ls(%u)%lsrtmp%dCrypt32.dllGETPASSWORD1%s %s%s %s %s%s%s%dSoftware\Microsoft\Windows\CurrentVersion%s.%d.tmpwinrarsfxmappingfile.tmp-el -s2 "-d%s" "-p%s" "-sp%s"__tmp_rar_sfx_access_check_%usfxcmdWaitForMultipleObjects error %d, GetLastError %dWindowsWScript.exe_640:
.text`.data.rsrc@.relocADVAPI32.dllKERNEL32.dllNTDLL.DLLUSER32.dllmsvcrt.dllOLEAUT32.dllole32.dllVERSION.dllwscript.exeadvapi32.dllkernel32.dll%s%s.DLLwintrust.dll%d.%dInvalid parameter passed to C runtime function.SOFTWARE\Classes\%s\%s0x%8XCreateURLMonikerExurlmon.dll@@8X%uRegCreateKeyARegCloseKeyRegOpenKeyARegDeleteKeyARegCreateKeyExWRegCreateKeyExARegOpenKeyExWReportEventWRegEnumKeyExARegOpenKeyExAGetProcessHeapGetCPInfoMsgWaitForMultipleObjectsEnumThreadWindowswscript.pdbstdole2.tlbWWW.ObjectWWKeyWWindowsFolderWWW4%CopyFolderWWLWindows Script Host (Ver 5.6)W)Windows Script Host Application InterfaceW%Windows Script Host ObjectebstrCmdLineW78t8x85Q5F5Software\Microsoft\Windows Script Host\SettingsWindows Script HostWScript.CreateObjectWSHRemote.ExecuteSoftware\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}.\%s.mui.\%s\%s.mui%s\%s.mui%s\%s\%s.mui%s\%sMicrosoft (R) Windows Based Script Host5.7.0.16599Microsoft (R) Windows Script Host(Windows Script Host (debugging disabled)Windows Script Host ErrorWindows Script Host Input ErrorThis Unicode version of Windows Script Host will only execute under Windows NT.Please use the ANSI version of Windows Script Host."WScript execution time was exceeded on script "%1!ls!".Script execution was terminated.1Could not locate automation class named "%1!ls!".Could not connect object.'Could not create object named "%1!ls!".1Initialization of the Windows Script Host failed.6Can't find script engine "%2!ls!" for script "%1!ls!".!Can't change default script host.=An attempt at saving your settings via the //S option failed.(Loading script "%1!ls!" failed (%2!ls!).Loading your settings failed.,Execution of the Windows Script Host failed.,Unexpected error of the Windows Script Host._Windows Script Host access is disabled on this machine. Contact your administrator for details. Missing job name.*Unicode is not supported on this platform. Command line options are saved.4The default script host is now set to "wscript.exe".4The default script host is now set to "cscript.exe".,Successful execution of Windows Script Host.3Successful remote execution of Windows Script Host.Win32 Error 0x%XWindows Script Host(Windows Script Host (debugging disabled)Usage: WScript scriptname.extension [option...] [arguments...]Use engine for executing scriptChanges the default script host to CScript.exeChanges the default script host to WScript.exe (default)Prevent logo display: No banner will be shown at execution time#WScript Error - Windows Script Host!Input Error - Windows Script HostlThis Unicode version of WScript will only execute under Windows NT.%6!ls! WScript - Script Execution Error!Windows Script Host Remote Script/Remote script object can only be executed once. Unable to execute remote script.
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
WScript.exe:640
win7.exe:316 - Delete the original Backdoor file.
- Delete or disinfect the following files created/modified by the Backdoor:
%Documents and Settings%\%current user%\Local Settings\Temp\re.txt (735 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\win7.exe (5105568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FP83.tmp (229 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\foxyinstalled.dll (52736 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\LinkMaker.dll (112640 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\Conf\Addresses.cfg (2296 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\win7.exe (5234688 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\win7.vbs (574 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"office" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\office.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"office" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\office.exe" - Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.